Prior to the Web, companies controlled the engagement with their prospects and customers through information. With the advent of the Social Web and introduction of social media, we are no longer in control of the selling process or influencing the buyer. The people are in control. Today, companies must recognize the paradigm shift in the public relations and marketing landscape as Web 2.0 has fundamentally changed the way we connect, communicate and influence our customers, partners, press, analysts, and other industry influencers. In this presentation titled: The Greatest Question Since the Meaning of Life – What is ROI of Social Media?, C. Edward Brice, SVP of Worldwide Marketing for Lumension, will provide real world insight into the following:
• The evolving marketing and PR landscape
• Why marketing MUST use social media
• Lumension’s story
• Key learnings
• Dos and Don’ts
How to Hook Customers with Habit-forming ProductsWrike
https://www.wrike.com/blog/interview-with-nir-eyal-hooked/ - Engaging products don't happen by mistake. We interviewed Nir Eyal, author of Hooked: How To Build Habit-Forming Products. His background in advertising and gaming has led him to write about consumer psychology principles that change customers' behavior. He explains how to create engaging products using the Hook model.
Creating Content for Millennials: Why It Matters + Strategies for SuccssNewsCred
Millennials are the most sought-after — and difficult to understand — demographic for marketers today. With purchasing power expected to hit $1.4 trillion by 2020, it’s imperative that brands connect and engage with this audience through content marketing.
What does a great experience have in common with a great story? Everything. While creating an experience that engages, influences, and excites can sometimes seem daunting, crafting a great story is actually quite quick and easy.
See how simple storytelling techniques can transform your next product, feature, UI, flow, or strategy from good to great. Whether you are creating a product, service, or feature from scratch or improving one for conversion, activation, or engagement, strategic storytelling will help you figure out what you need to do, when, and how you need to do it, so that you get the results you need.
About Donna Lichaw
Donna is the author of The User’s Journey: Storymapping Products That People Love. Through her writing, speaking, and much loved Storymapping Workshop, Donna guides startups, non-profits, and global brands in optimizing their digital products and services by providing them with a simplified way to drive user engagement. Utilizing her ‘story first’ approach, she helps organizations define and refine their value proposition, transform their thinking, and better engage with their core customers.
Recognized as a thought leader in storytelling and customer engagement strategies, she has presented as a keynote speaker at design and technology conferences in the US, Canada and Europe. She has also taught courses at New York University, Northwestern University, The School of Visual Arts, and Parsons the New School for Design. Prior to her career in technology, she refined her talent for storytelling and narrative development as an award-winning documentary filmmaker. You can find her on the web at www.donnalichaw.com.
PPC is not enough. How I learned to embrace holistic growth marketing at Moz ...Justin Vanning
I spent 10 years doing Performance Marketing. I used to think Performance Marketing and Customer Acquisition went hand in hand.
That was before I started working at Moz and interacting with Rand Fishkin. Over the past two years I've learned the value of Inbound Marketing and a more holistic approach to customer acquisition that I believe is the key to successfully growing a company.
Performance Marketers have all the skillsets necessary to be amazing at Inbound marketing. The sooner they can utilize these skillsets and start embracing alternative approaches to customer acquisition, the sooner they can reap the rewards.
Case Study: Mastering digital disruption in retailScopernia
Retail companies have quite some challenges with the way the world is (rapidly) changing due to digitization. That’s why Belgian retailer Torfs & Duval Union Consulting have worked together to set up a strategy to master the digital transformation of Torfs.
In the following case study, we discuss the current market situation and disruptive trends in retail based on our seven Drivers of Transformation.
It’s fundamental to understand what is going on at the moment in the retail industry, where it is going and identify critical threats when constructing a digital strategy towards the future.
Need help with your transformation?
Do contact us: through a series of workshops, we help you to understand digital disruption and offer you a model to shape your own future.
New Content Marketing Research and Resources [Webinar]LinkedIn
LinkedIn hosted a webinar entitled "New Content Marketing Research and Resources" in which Taylor Schreiner, Director of Insights for LinkedIn Marketing Solutions, and Valter Sciarrillo, Head of Measurement, presented new research and resources for marketers looking to better measure and drive success with their content marketing efforts. Check out this presentation from the webinar.
Want more LinkedIn Marketing Solutions insights and resources? Visit our page here: http://business.linkedin.com/marketing-solutions/social-media-strategy.html?src=s-ss
How to Hook Customers with Habit-forming ProductsWrike
https://www.wrike.com/blog/interview-with-nir-eyal-hooked/ - Engaging products don't happen by mistake. We interviewed Nir Eyal, author of Hooked: How To Build Habit-Forming Products. His background in advertising and gaming has led him to write about consumer psychology principles that change customers' behavior. He explains how to create engaging products using the Hook model.
Creating Content for Millennials: Why It Matters + Strategies for SuccssNewsCred
Millennials are the most sought-after — and difficult to understand — demographic for marketers today. With purchasing power expected to hit $1.4 trillion by 2020, it’s imperative that brands connect and engage with this audience through content marketing.
What does a great experience have in common with a great story? Everything. While creating an experience that engages, influences, and excites can sometimes seem daunting, crafting a great story is actually quite quick and easy.
See how simple storytelling techniques can transform your next product, feature, UI, flow, or strategy from good to great. Whether you are creating a product, service, or feature from scratch or improving one for conversion, activation, or engagement, strategic storytelling will help you figure out what you need to do, when, and how you need to do it, so that you get the results you need.
About Donna Lichaw
Donna is the author of The User’s Journey: Storymapping Products That People Love. Through her writing, speaking, and much loved Storymapping Workshop, Donna guides startups, non-profits, and global brands in optimizing their digital products and services by providing them with a simplified way to drive user engagement. Utilizing her ‘story first’ approach, she helps organizations define and refine their value proposition, transform their thinking, and better engage with their core customers.
Recognized as a thought leader in storytelling and customer engagement strategies, she has presented as a keynote speaker at design and technology conferences in the US, Canada and Europe. She has also taught courses at New York University, Northwestern University, The School of Visual Arts, and Parsons the New School for Design. Prior to her career in technology, she refined her talent for storytelling and narrative development as an award-winning documentary filmmaker. You can find her on the web at www.donnalichaw.com.
PPC is not enough. How I learned to embrace holistic growth marketing at Moz ...Justin Vanning
I spent 10 years doing Performance Marketing. I used to think Performance Marketing and Customer Acquisition went hand in hand.
That was before I started working at Moz and interacting with Rand Fishkin. Over the past two years I've learned the value of Inbound Marketing and a more holistic approach to customer acquisition that I believe is the key to successfully growing a company.
Performance Marketers have all the skillsets necessary to be amazing at Inbound marketing. The sooner they can utilize these skillsets and start embracing alternative approaches to customer acquisition, the sooner they can reap the rewards.
Case Study: Mastering digital disruption in retailScopernia
Retail companies have quite some challenges with the way the world is (rapidly) changing due to digitization. That’s why Belgian retailer Torfs & Duval Union Consulting have worked together to set up a strategy to master the digital transformation of Torfs.
In the following case study, we discuss the current market situation and disruptive trends in retail based on our seven Drivers of Transformation.
It’s fundamental to understand what is going on at the moment in the retail industry, where it is going and identify critical threats when constructing a digital strategy towards the future.
Need help with your transformation?
Do contact us: through a series of workshops, we help you to understand digital disruption and offer you a model to shape your own future.
New Content Marketing Research and Resources [Webinar]LinkedIn
LinkedIn hosted a webinar entitled "New Content Marketing Research and Resources" in which Taylor Schreiner, Director of Insights for LinkedIn Marketing Solutions, and Valter Sciarrillo, Head of Measurement, presented new research and resources for marketers looking to better measure and drive success with their content marketing efforts. Check out this presentation from the webinar.
Want more LinkedIn Marketing Solutions insights and resources? Visit our page here: http://business.linkedin.com/marketing-solutions/social-media-strategy.html?src=s-ss
Community Building: Driving More Diversity & Inclusion in TechDr. Melissa Sassi
Diversity & inclusion drives better performance, products, and insights when teams are reflective of their audience(s). What are the six steps I used to drive greater diversity and inclusion in the programs I run at IBM? Check out this presentation for pointed examples and ideas to move you from zero to hero.
Next-level collaboration: The future of content and design | Confab 2015Rebekah Baggs
Imagine a future where siloed departments and legacy workflows don’t stand in our way. Today’s content is complex, interconnected, and needs to be ready for devices we haven’t even dreamed of yet. Tomorrow isn’t going to get any simpler. Successful outcomes demand a new kind of collaboration.
For the past two years, Rebekah has studied how successful teams collaborate and has helped transform the way her team works and produces together. In this session, you’ll hear what she’s learned about making effective cross-discipline collaboration possible, and leave with actionable approaches you can use to unite your team and workflow, too.
In this talk, we discussed:
- What it takes to make effective collaboration possible
- How content strategists play a key role in creating the cross-discipline teams of tomorrow
- Practical techniques you can use to bridge silos, increase productivity, and deliver better project outcomes for everyone
Designing for life-changing impact: From bottled water to ending world povertyYuan Wang
Perhaps you’ve bought a bottle of Thankyou water from 7-eleven? Or grabbed a Thankyou body wash from the supermarket shelves at Woolworths? 100% of the profits from their products goes towards ending global poverty, by funding safe water, food and hygiene and sanitation services around the world. How does Thankyou prove their impact?
“Track Your Impact” is Thankyou’s unique system which lets you see exactly which project your product is helping to fund. Your journey starts picking up a product from the shops, then via the Internet to a far-away country like Haiti, where you can track your product to a specific village, and continue onto social media and email. This customer experience is only made possible by a multitude of online and offline operations including field partners on the ground, product suppliers, the Creative and Impact teams at Thankyou’s head office, the TYI back-end management system and the ground-breaking website redesigned by digital agency Yump.
Co-presented by Thankyou and Yump, we will discuss the challenges of designing an experience that hasn’t been done before, that sounds “cool” but is difficult to understand for the consumer. We will share our design process and methodology, including the research and insights that have informed our decisions. Most importantly, we will discuss our learnings and how they can help other user experience (UX) or customer experience (CX) practitioners who are designing for social impact.
For full case study, continue reading at https://yump.com.au/portfolio/thankyou/
10 Digital Hacks Every Marketer Should KnowMark Fidelman
I've spent the last 10 years discovering the best digital marketing hacks to move the awareness and revenue needle. I'm giving you 3 examples and 10 hacks to improve your marketing game dramatically.
https://www.wrike.com/blog - We surveyed creative teams to discover their biggest challenges and bottlenecks, from conception to completion. And what we discovered was: creative teams have to organize requests, listen to feedback, and seek approvals, all while trying to incorporate their own creative vision, making it difficult to prioritize and meet deadlines. Check out the details in our Slideshare.
Marketing has created so much annoying noise that consumers and platforms are starting to sort out the mess and that means trouble for brands. Facebook’s EdgeRank, Google’s focus on authoritative content and Ad Blockers are just a few of the tactics to get rid of low quality noise. And then there are people simply ignoring the content they don’t like. Now is the time to stop thinking like a marketer and start acting like a social publisher – someone that publishes remarkable content not to sell, not to market, but to be social and to build long lasting relationships with an alpha audience. Then you don’t have to market. Your audience will do your marketing for you. It’s a bit of semantics but what it serves to do is change your outlook and that will make all the difference.
Go to www.cfnps.org for information about upcoming events. Videos are not only a valuable way to showcase your organization. They also can be used to direct traffic to your website, thanks to YouTube features such as commenting, rating, and sharing. In addition, you can use YouTube to track and shape your message as your outreach campaign develops. In this way, your YouTube videos become an integral part of your social marketing strategy.
In this session we will cover the following:
• Incorporating Insight Statistics and other YouTube ratings and user comments to shape your communications strategy
• Linking your YouTube video to other networking sites like Facebook
• Adding keyword tags to your YouTube channel
• Using Call-to-action overlays on your videos to drive campaigns
• Including the Google Checkout “Donate” button in your video.
How to promote your brand in social networksLoic Le Meur
It’s been a pleasure to talk to marketers and agencies at AdTech San Francisco about how I see brands can best take advantage of social networks such as Twitter and Facebook and I delivered a message I think very different than what most of them do. Most brands see the world in terms of how much exposure (impressions) they are getting or how many followers and fans… It is not about doing another campaign, it is about listening, replying an building long term trust and it is much more difficult, it also takes years and does not come easily.
Easily share what happened during the past year with a beautiful presentation from Venngage. Bring attention to your accomplishments with graphs, charts, and engaging icons. With a presentation from Venngage your audience will be on the edge of their seats.
Seven Habits of Highly Effective Digital Marketers - Tops Tips for 2015!Digital Annexe
Seven top tips on how to improve your digital marketing for 2015.
First presented at DA University conference in November 2014 by Sean Singleton of Digital Annexe.
This guide will help you familiarize yourself with the most common websites errors and mistakes that are committed by business owners, executives, web design and development companies as well as digital agencies.
Chances are your content sucks. Don't fret. In this SlideShare presentation, we will share 10 ways to help your content go viral like BuzzFeed plus real-life examples to get you started. http://www.happymarketer.com/
Presentation given at the Zillow Group's Multifamily conference in Austin, Texas on 9/27/2016. We dive into the changes happening in digital marketing and what YOU (the marketer) must do to survive. It's a scary world out there.
This is a high level synopsis of the book, Smart Business, Social Business: A Playbook for Social Media in Your Organization by Michael Brito (@britopian)
Community Building: Driving More Diversity & Inclusion in TechDr. Melissa Sassi
Diversity & inclusion drives better performance, products, and insights when teams are reflective of their audience(s). What are the six steps I used to drive greater diversity and inclusion in the programs I run at IBM? Check out this presentation for pointed examples and ideas to move you from zero to hero.
Next-level collaboration: The future of content and design | Confab 2015Rebekah Baggs
Imagine a future where siloed departments and legacy workflows don’t stand in our way. Today’s content is complex, interconnected, and needs to be ready for devices we haven’t even dreamed of yet. Tomorrow isn’t going to get any simpler. Successful outcomes demand a new kind of collaboration.
For the past two years, Rebekah has studied how successful teams collaborate and has helped transform the way her team works and produces together. In this session, you’ll hear what she’s learned about making effective cross-discipline collaboration possible, and leave with actionable approaches you can use to unite your team and workflow, too.
In this talk, we discussed:
- What it takes to make effective collaboration possible
- How content strategists play a key role in creating the cross-discipline teams of tomorrow
- Practical techniques you can use to bridge silos, increase productivity, and deliver better project outcomes for everyone
Designing for life-changing impact: From bottled water to ending world povertyYuan Wang
Perhaps you’ve bought a bottle of Thankyou water from 7-eleven? Or grabbed a Thankyou body wash from the supermarket shelves at Woolworths? 100% of the profits from their products goes towards ending global poverty, by funding safe water, food and hygiene and sanitation services around the world. How does Thankyou prove their impact?
“Track Your Impact” is Thankyou’s unique system which lets you see exactly which project your product is helping to fund. Your journey starts picking up a product from the shops, then via the Internet to a far-away country like Haiti, where you can track your product to a specific village, and continue onto social media and email. This customer experience is only made possible by a multitude of online and offline operations including field partners on the ground, product suppliers, the Creative and Impact teams at Thankyou’s head office, the TYI back-end management system and the ground-breaking website redesigned by digital agency Yump.
Co-presented by Thankyou and Yump, we will discuss the challenges of designing an experience that hasn’t been done before, that sounds “cool” but is difficult to understand for the consumer. We will share our design process and methodology, including the research and insights that have informed our decisions. Most importantly, we will discuss our learnings and how they can help other user experience (UX) or customer experience (CX) practitioners who are designing for social impact.
For full case study, continue reading at https://yump.com.au/portfolio/thankyou/
10 Digital Hacks Every Marketer Should KnowMark Fidelman
I've spent the last 10 years discovering the best digital marketing hacks to move the awareness and revenue needle. I'm giving you 3 examples and 10 hacks to improve your marketing game dramatically.
https://www.wrike.com/blog - We surveyed creative teams to discover their biggest challenges and bottlenecks, from conception to completion. And what we discovered was: creative teams have to organize requests, listen to feedback, and seek approvals, all while trying to incorporate their own creative vision, making it difficult to prioritize and meet deadlines. Check out the details in our Slideshare.
Marketing has created so much annoying noise that consumers and platforms are starting to sort out the mess and that means trouble for brands. Facebook’s EdgeRank, Google’s focus on authoritative content and Ad Blockers are just a few of the tactics to get rid of low quality noise. And then there are people simply ignoring the content they don’t like. Now is the time to stop thinking like a marketer and start acting like a social publisher – someone that publishes remarkable content not to sell, not to market, but to be social and to build long lasting relationships with an alpha audience. Then you don’t have to market. Your audience will do your marketing for you. It’s a bit of semantics but what it serves to do is change your outlook and that will make all the difference.
Go to www.cfnps.org for information about upcoming events. Videos are not only a valuable way to showcase your organization. They also can be used to direct traffic to your website, thanks to YouTube features such as commenting, rating, and sharing. In addition, you can use YouTube to track and shape your message as your outreach campaign develops. In this way, your YouTube videos become an integral part of your social marketing strategy.
In this session we will cover the following:
• Incorporating Insight Statistics and other YouTube ratings and user comments to shape your communications strategy
• Linking your YouTube video to other networking sites like Facebook
• Adding keyword tags to your YouTube channel
• Using Call-to-action overlays on your videos to drive campaigns
• Including the Google Checkout “Donate” button in your video.
How to promote your brand in social networksLoic Le Meur
It’s been a pleasure to talk to marketers and agencies at AdTech San Francisco about how I see brands can best take advantage of social networks such as Twitter and Facebook and I delivered a message I think very different than what most of them do. Most brands see the world in terms of how much exposure (impressions) they are getting or how many followers and fans… It is not about doing another campaign, it is about listening, replying an building long term trust and it is much more difficult, it also takes years and does not come easily.
Easily share what happened during the past year with a beautiful presentation from Venngage. Bring attention to your accomplishments with graphs, charts, and engaging icons. With a presentation from Venngage your audience will be on the edge of their seats.
Seven Habits of Highly Effective Digital Marketers - Tops Tips for 2015!Digital Annexe
Seven top tips on how to improve your digital marketing for 2015.
First presented at DA University conference in November 2014 by Sean Singleton of Digital Annexe.
This guide will help you familiarize yourself with the most common websites errors and mistakes that are committed by business owners, executives, web design and development companies as well as digital agencies.
Chances are your content sucks. Don't fret. In this SlideShare presentation, we will share 10 ways to help your content go viral like BuzzFeed plus real-life examples to get you started. http://www.happymarketer.com/
Presentation given at the Zillow Group's Multifamily conference in Austin, Texas on 9/27/2016. We dive into the changes happening in digital marketing and what YOU (the marketer) must do to survive. It's a scary world out there.
This is a high level synopsis of the book, Smart Business, Social Business: A Playbook for Social Media in Your Organization by Michael Brito (@britopian)
An important model of Psychotherapy helps to find out the meaning and purpose of life especially for those who think that finishing themselves would finish all of their life problems......!....which is never true....!!!
Every human on this earth has some purpose and meaning to be here. The human has to progress itself in a positive way and help the society to prosper positively...as each human is special and is an important part of it!
Help those who cannot help themselves!!!
Integrated web marketing and Social media -explainedShanq Web
Your non-participation as a social media marketing agency does not mark your idleness in it. But you must check out on the sport you have been missing by ignoring this field.
Introduction to social media - Shahnawaz KarimShahnawaz Karim
Introduction to social media. This PPT gives you all the information that you need to know about social media as well as how to implement the campaigns.
What is social media? How can your organization effectively use social media tools including Facebook, Twitter, blogs, and YouTube to gain a competitive advantage and win new customers and donors? Learn how to join the conversation online and use social media to reach influencers that will spread your message to their communities.
Tactica is pleased release an update to The Conversation - An Introduction to Social Media - an introductory seminar exploring the power of social media by Kevin Glasier.
Social media is one of the fastest growing categories on the web and it offers unlimited potential for public relations and marketing professionals. This presentation provides:
• A definition of social media;
• 10 keys to social media success;
• an overview of social media tools; and
• social media myths.
The updated presentation was given to The Certified Management Accountants of Manitoba and at Going Barefoot – a conference for non-profit communicators.
Now that social media is becoming a mainstream marketing and PR component we need move beyond experimenting and testing. It's time to figure out how to get social media right. Learn about using Facebook, Twitter and YouTube.
Got Clout - GCC Global Coaches Conference October 2011Lisa McKenzie ★
Welcome to Red Carpet Strategies, thank you for joining us here to participate in our presentation with the Global Coaches Conference. Follow along with the slides below as you listen to Lisa McKenzie share her strategies on how to build your personal brand, share your expertise, grow your audience and discover how to measure and manage your social influence.
About Global Coaches Conference
Global Coaches Conference is the fastest growing online coaching conferences for global change leaders. Lively, enriching, powerful conversations with change leaders around the world.
Using SCCM 2012 r2 to Patch Linux, UNIX and MacsLumension
Today, everything has to be patched. From desktop and laptop to server and every operating system in between. With compliance, what we have to pay attention to is what’s actually out there on our network – not just what you wish were there.
Servers (Windows, UNIX and Linux)Even Windows-centric environments have at least a few UNIX or Linux servers that need to be secure and patched. Linux and UNIX servers often fulfill critical functions with few and short maintenance windows. These can be a real pain point for admins who specialize in Windows or are managed by an entirely different admin.
Desktops (Windows and Macs)Maybe you are responsible for desktops instead of servers. Again it’s not just a Windows story any more. More and more people are opting for Macs instead of Windows. Watch the vulnerability lists and you’ll see that Macs need patching too.
The kicker though is the 80/20 rule. If at least 80% of the computers on your network are Windows and the remaining 20% are everything else – it’s a safe bet, given the maturity and ease of WSUS, that 20% of your patching effort goes to Windows but 80% of your effort is consumed with patching all the different flavors of UNIX, Linux and your Mac computers. We need one system to manage all our patches and one pane of glass to prove compliance from data center to desktop.
Believe it or not System Center 2012 R2 provides the infrastructure to do just that – it just needs a little help. Last time we showed you how you can patch 3rd party apps on Windows through System Center Update Manager. This time we’ll show you how you can patch non-Windows systems using the new System Center clients for UNIX, Linux and Mac.
2015 Endpoint and Mobile Security Buyers GuideLumension
Mike Rothman, Analyst and President of Securosis, as he dives into an interactive discussion around endpoint security management in 2015.
• Protecting Endpoints: How the attack surface has changed, and the impact to your defense strategy
• Anti-Malware: The best ways to deal with today’s malware and effectively protect your endpoints from attack
• Endpoint Hygiene: Why you can’t forget the importance of ensuring solid management of your endpoint devices
• BYOD and Mobility: The extent that corporate data on smart mobile devices impacts your organization
• The Most Important Buying Considerations in 2015
Top 10 Things to Secure on iOS and Android to Protect Corporate InformationLumension
Security expert Randy Franklin Smith from Ultimate Windows Security, shows you a technical and pragmatic approach to mobile security for iOS and Android. For instance, for iOS-based devices, he talks about:
• System security
• Encryption and data protection
• App Security
• Device controls
Randy also discusses Android-based devices. While Android gets its kernel from Linux, it builds on Linux security in a very specialized way to isolate applications from each other. And learn about iOS and Android mobile device management needs: Password and remote wipe capabilities are obvious but there’s much more to the story. And you’ll hear Randy's list of top-10 things you need to secure and manage on mobile devices in order to protect access to your organization’s network and information.
2014 BYOD and Mobile Security Survey Preliminary ResultsLumension
The preliminary results are in - hear what more than 1,000 members of the Linkedin Infosec Community have to say about BYOD and mobile security challenges including what they are doing to combat mobile device risk and what solutions and security practices really work.
Securing Your Point of Sale Systems: Stopping Malware and Data TheftLumension
Point of Sale (POS) systems have long been the target of financially-motivated crime. And in 2013 the magnitude of cybercrime against POS systems skyrocketed, with 97% of breaches in the retail sector and 47% in the healthcare sector aimed against POS systems. With sensitive financial and personal records getting exposed by the millions, the FBI recently warned that POS systems are under sustained and continued attack.
During this webcast, we will take you into the three critical entry points to POS system attacks. We’ll discuss how the attacks look, the timelines for these breaches, and what proactive security measures you can take to help your organization minimize the risk to your POS systems.
•3 Critical Entry Points to POS System Attacks
•Impacts to an Organization
•Top 3 Security Measures to Minimize Risk
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...Lumension
Thanks to you, the audience at UltimateWindowsSecurity, for the 2014 Survey. It was a great success with over 600 respondents! I appreciate all of you who took the time give me your thoughts.
You’ve provided some great ideas for real training for free™ in the coming year and I’ve learned which topics are most important to you. That’s going to benefit all of us.
In this presentation, we'll present our findings. We’ll talk about the community’s top goals for 2014, which topics you recommended I cover in 2014 and what our community sees as the greatest security concerns for 2014. And we’ll discuss other trends emerging from the data.
Find out about the top trends, such as:
SIEM – What are the top SIEM solutions? What is the UWS community’s top 3 biggest challenges with log/monitoring/security analytics?
Endpoint Security – How widely is application whitelisting being used and what is driving its adoption? Which endpoint security technologies really work and which are just hype?
Mobile Devices – Are employee owned mobile devices supported at your organization? Is your biggest concern with mobile devices malware, data loss, compliance?
The Cloud – How widely are your peers embracing the cloud? Is your organization’s security policy, technology and training keeping up with the move to the cloud?
Advanced Security Topics – What are your peers doing about “big data”? What about endpoints as sensors, and other new security approaches?
This will be a fact-filled and fascinating presentation on where we are and where we are going on a host of different security fronts. Don’t miss it.
Greatest It Security Risks of 2014: 5th Annual State of Endpoint RiskLumension
Organizations around the world are losing intellectual property and customer data to cyber criminals at mind-boggling rates. How is this happening?
For 5 consecutive years, the annual State of the Endpoint Report, conducted by Ponemon Institute, has surveyed IT practitioners involved in securing endpoints. This year’s report reveals endpoint security risk is more difficult to minimize than ever before. What are IT pros most concerned about heading into 2014? From the proliferation of mobile devices, third party applications, and targeted attacks/APTs, endpoint security risk for 2014 is becoming more of a challenge to manage.
Larry Ponemon of the Ponemon Institute reveals statistics on growing insecurity, IT’s perceived areas of greatest risk for 2014 as well as tactical suggestions for how to improve your endpoint security. Specifically, you will learn:
•IT perspective on the changing threat landscape and today’s Top 5 risks;
•Disconnect between perceived risk and corresponding strategies to combat those threats;
•Tips and tricks on how to best communicate today’s threats and subsequent needed responses up the management chain
Adobe Hacked Again: What Does It Mean for You? Lumension
Last time it was Adobe’s code signing servers. This time it’s 2.9 million (let’s just call it 3) customers’ data and lots and lots of source code – including that of Acrobat. Adobe products already require constant patching but offer no enterprise level solution for patching. In this presentation by Ultimate Windows Security, we’ll present why this will likely lead to more and we’ll look at what we know about this latest Adobe breach.
But more importantly I’ll show what you can do in advance to protect yourself against zero-day exploits in Adobe products and programs. After all this won’t be the last time a software vendor is hacked. In this day and age we have to protect ourselves from the failures of our software providers.
I’ll present 3 ways you can go on the offensive to protect yourself from the constant vulnerabilities discovered in Adobe Reader, Acrobat, Flash and Oracle Java. Here’s what we’ll discuss:
*Alternatives to Adobe and Java
*Different ways to containing vulnerable apps in a sandbox
* Using advanced memory protection technologies to detect and stop buffer overflows and other memory based attacks
Patching and AV only helps you close the window on hacker opportunity. To prevent the window from opening in the first place you have to prevent untrusted code from ever running in the first place. That requires application whitelisting and memory protection against code injection – a growing menace that bypasses controls based on file system and EXE scanning.
That’s why Lumension is sponsoring this event. I think you’ll be interested seeing 2 of their end-point security technologies that will help protect you from the new exploits on their way as a result of this hack as well as the constant stream of exploits discovered every day.
This is going to be a really cool presentation with practical tips that you can apply. Learn how to protect your systems from other software vendor vulnerabilities.
Data Protection Rules are Changing: What Can You Do to Prepare?Lumension
The European Union’s proposed new data protection regulation aims to update Europe’s data protection laws and to provide a more consistent data protection framework across the Continent.
But the new regulation, which replaces the EU’s existing data protection directive and member states’ data protection laws, will put some new demands on organisations holding personal data. Breach disclosure and “the right to be forgotten” will force businesses to update their data protection and retention policies.
This presentation will:
- Review the current EU laws, and contrast them with laws in other parts of the world;
- Examine the arguments for strengthening data protection in Europe, and the likely outcomes;
- Look at what security teams should already be doing to put themselves ahead of legislative changes;
- Outline strategies and technologies organisations need to meet current and future data protection requirements
- Help infosecurity teams to explain the changes – and their consequences – to their boards
Java Insecurity: How to Deal with the Constant VulnerabilitiesLumension
Just over a decade ago, the outcry over Microsoft’s security problems reached such a deafening level that it finally got the attention of Bill Gates, who wrote the famous Trustworthy Computing memo. Today, many would say that Microsoft leads the industry in security and vulnerability handling.
Now, it’s Java that’s causing the uproar. But has Oracle learned anything from Microsoft in handling these seemingly ceaseless problems? I’ll start by reviewing the wide-ranging Java security changes Oracle is promising to make. They sound so much like the improvements Microsoft made back with Trustworthy Computing that I’m amazed it hasn’t been done before! We’ll move on to discuss what you can do now to address Java security in your environment.
One of the banes of security with Java is the presence of multiple versions of Java, often on the same computer. Sometimes you really need multiple versions of Java to support applications with version dependencies (crazy, I know). But other times, multiple copies of Java are there “just because.” In this webinar, we’ll talk about the current Java mess and how you can get out of it, including:
Assessment. We’ll discuss ways and tools for cataloging what versions of Java are actually out there on your endpoints.
Identification. We’ll look at methods for identifying which versions are actually required by your users; for instance, I’ll show you how you might use Process Tracking and File Access events in the Windows Security Log to see which Java files are being accessed, by whom, and by which programs.
Disabling. Can you just disable Java? Maybe not for everyone, but what if you could disable it for certain roles within your company that make up 25% – or even 75% – of your workforce? That would be worth it. We’ll explore how you might go about such a measure.
Hardening. We’ll dive into the technical details of hardening Java and reducing your Java attack surface, where possible.
Filtering. Another way to reduce your Java risk is by filtering Java content at your gateway. Again not full coverage control – but what is?
Patching. Then, we’ll delve into the Java patching nightmare. Depending on self-updaters on each endpoint, is could be a recipe for disaster, and I’ll explain why. Basically the only way out of the Java mess is a 3rd party solution that can perform centralized patch management and remediation and that’s where our sponsor, Lumension, will come in.
BYOD & Mobile Security: How to Respond to the Security RisksLumension
Bring Your Own Device (BYOD) is a popular topic in 2013. Trying to understand the security risks and prepare strategies to either adopt, or decide against BYOD for security and data control reasons is the challenge.
The 160,000 member Information Security Community on LinkedIn conducted the survey "BYOD & Mobile Security 2013" to shed some light on the drivers for BYOD, how companies will benefit from BYOD, and how they respond to the security risks associated with this trend. With 1,600 responses, some interesting insights and patterns into BYOD were uncovered.
3 Executive Strategies to Reduce Your IT RiskLumension
Do you want to know how ‘best-of-breed’ enterprises prioritize their IT risk? Join Richard Mason, Vice President & Chief Security Officer at Honeywell, whose team is responsible for global security, during a roundtable discussion with Pat Clawson, Chairman & CEO of Lumension and Roger Grimes, Security Columnist & Author. Uncover strategies beyond traditional antivirus signatures and learn a more holistic approach to effective risk management. Find out ‘how’ and ‘why’ you can make security a prioritized function within your organization.
Join this expert panel webcast to learn how to:
1)Understand your business audiences and evaluate their risk tolerance
2)Leverage reputation management services that are appropriate for your organization
3)Utilize realistic change management to secure prioritized data depositories
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...Lumension
APTs have become a major topic of conversation – and in some cases, a critical threat – among IT security departments. But the technology and motivation behind APTs has changed significantly since the introduction of Stuxnet, continuing to evolve rapidly to avoid detection.
In this special Dark Reading presentation, a leading expert on the origins and directions of APTs will discuss the changing nature of these sophisticated threats – and how you can prepare your enterprise security environment to detect and mitigate these complex and dangerous attacks.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
8. “Social media is like teen sex. Everyone wants to do it. Nobody knows how. When it’s finally done there is a surprise that it’s not better.” - AvonashKaushik – Analytics Evangelist, Google
16. The traditional marketing model is being challenged, and (CMOs) can foresee a day when it will no longer work.-McKinsey Quarterly FUTURELAB
17. Future of Media: Digital & Universally Accessible Global Mobile TV / Offline The Cloud Anytime - Any Place - Any Tools- Millions of Channels FUTURELAB
18. 14,463,346 auctions 200,000,000 blogs www.ebay.com 21 Nov 2006 Almost 4,000,000 articles (10 languages) >100,000,000 videos (65,000/day) 1.5 million residents “The workers should appropriate the means of production” 33,347,000 profiles FUTURELAB
25. 2% reduction in negative word of mouth boosts sales growth by 1%
26. For the average company,1% increase in word of mouth advocacy equated to $16M extra sales A person like yourself or a peer
27. RADIO, TV, PRINT, EVENTS, ARE NICE, YET IN MY REALITY MY ECOSYSTEM IS THE BRAND The words they write, speak, film The Stories They Tell Consumersare beginning in a very real sense to ownour brands and participate in theircreation… Weneed to begin to learn to let go. - A.G. Lafley, CEO and Chairman of P&G FUTURELAB
53. Ed’s Social Media Value Goals Awareness Engagement Listening Innovation Brand SEO Thought Leadership Advocacy Influence Evangelism Sentiment Service Insight Ideation Feedback Collaboration
54. Ed’s Social Media Value Goals Innovation Listening Value Created Engagement Awareness Time
55. Ed’s Social Media Value Goals Awareness Engagement Listening Innovation Brand SEO Thought Leadership Advocacy Influence Evangelism Sentiment Service Insight Ideation Feedback Collaboration Evangelism Success KPIs Page views Replies Suggestions Comments Inbound Links Complaints Friends Press mentions Traffic Followers Referrals Embedded content Registrations Posts Syndication
61. Lumension’s History Acquired: July ‘07 Acquired: Feb ‘07 Acquired: April ‘09 Founded in 1991 Established: Sept ‘07 Market-leading patch management First cross-platform and application patch management solution Enterprise-class vulnerability management First credentialed based vulnerability scanner Market-leading device and application control First to introduce whitelisting / patented file “shadowing” technology Compliance and Risk Management. Delivering predefined compliance and control frameworks
84. Visitor Commitment8.57 pages avg. per visit 11.24% of visitors viewed more than 20 pages 8:50 avg. time on site 24.5% bounce rate ~8 visits per day Content Garden
91. Understand Your Personas LISA AUDIT MANAGER BIG REGULATED, INC. JACK DIR/MNGR INFO SEC Big REGULATED, INC. CHUCK CISO/VP INFO SEC BIG REGULATED, INC. Reads industry blogs Member of online professional community Socially Facebooks Active Blogger Active Twitterer Member of online professional community Engaged in online forums Socially Facebooks Reads industry publications & business press Attends industry events Facebooks to keep in touch with Grandchildren