Share

Live Webinar July 15th, 2020 – 1:30 pm – 2:30 pm EDT
Activity Type: Education – Course or Training  1 Hour  1 PDU free
Provider: Coveros  (REP #2466)

The demands on modern software development drive a robust market for code reuse, open source components, and third-party APIs. But is this dependency making organizations more vulnerable to software supply chain attacks?

Could you be the next SolarWinds or Colonial Pipeline? Could you, your suppliers, your partners, or your customers be at risk?

Join Coveros CEO Jeffery Payne (LinkedIn profile) and application security pioneer, Jeff Williams, (LinkedIn profile) founder and CTO of Contrast Security, as they explore the causes and consequences of software supply chain attacks.

Learn what supply chain attacks are, what causes them to occur, and how you can best protect your software supply chain.

Whether you’re an engineer or an executive, you’ll leave with valuable insight into steps you should be taking to protect your software and your organization.

Click to register for:
What You Need To Know About Software Supply Chain Attacks

0 0 1.0
Technical Project Management Leadership Strategic & Business Management

NOTE: For PMI® Audit Purposes – Print Out This Post!  Take notes on this page during the presentation and also indicate the Date & Time you attended. Note any information from the presentation you found useful to your professional development and place it in your audit folder.

Share

Live Webinar – July 6th 2020, 12:00 pm – 12:30 pm EDT
Activity Type: Education – Course or Training  .5 Hour  .5 PDU
Provider:  Global Knowledge UK  (REP 1999)

A quick 30 minute look at ITIL4 Service Value System focusing on the guiding principles – part of the core guidance of ITIL4.

This webinar includes an example of how this guidance might be applied in an organization.

In this webinar, you will learn:

  1. An Introduction to ITIL
  2. The evolution of ITIL
  3. The ITIL4 Service Value System components
  4. The ITIL4 Guiding Principles
  5. A sample application of the Guiding Principles

Presenter: Paul LaSalle (LinkedIn profile) has 40+ years of experience as a trainer who brings an understanding and appreciation of business needs and objectives into the classroom. Working through numerous organizations, Paul has served as a Systems Analyst, Network Analyst, Network Architect, Project Manager, Management Consultant, and Business Analyst. He is a co-author of the TCP/IP Bible.

Click to register for:
ITIL 4 Guiding Principles In 30 Minutes

0.5 0 0
Technical Project Management Leadership Strategic & Business Management

NOTE: For PMI® Audit Purposes – Print Out This Post!  Take notes on this page during the presentation and also indicate the Date & Time you attended. Note any information from the presentation you found useful to your professional development and place it in your audit folder.

Share

Live Webinar – June 30th, 2021 1:00 pm – 2:00 pm EDT
Activity Type: Education – Course or Training  1 Hour  1 PDU
Provider: SD Times (Software Development Times)

A recent study conducted by Aite group found that 97% of financial apps have no protections against decompiling and viewing source code.

In fact, of the 4+ million apps in Google’s Play Store and Apple’s App Store, the majority are not sufficiently protected to stop even the most basic reverse engineering attack.

This is especially concerning with faster release and shorter testing cycles creating more frequent opportunities to introduce new vulnerabilities into production.

Apps can be your biggest asset – how can you prevent them from becoming your biggest liability?

With app security expertise in short supply, organizations are often limited to protecting only their most critical apps.

Not anymore!

New innovations in app security make it easy – and cost-effective – to incorporate app protection into your DevOps pipeline and provide the right level of protection to all your apps.

Join Mike Woodard, (LinkedIn profile) Application Protection Product owner at Digital.ai, formerly Arxan Technologies, to learn more about:

  • Recent application security breaches and lessons learned
  • A tiered approach to identifying essential levels of app protection needed
  • A risk-based approach to moving from reactive to proactive app protection
  • Best practices for incorporating App Security in all DevOps pipelines

Click to register for:
Protect All Your Applications: A Low Code Approach

0 0 1.0
Technical Project Management Leadership Strategic & Business Management

NOTE: For PMI® Audit Purposes – Print Out This Post!  Take notes on this page during the presentation and also indicate the Date & Time you attended. Note any information from the presentation you found useful to your professional development and place it in your audit folder.

Share

Live Webinar – June 24th, 2021 1:00 pm – 2:00 pm EDT
Activity Type: Education – Course or Training  1 Hour  1 PDU
Provider: SD Times (Software Development Times)

While modernization is essential to staying competitive in today’s IT landscape, businesses are modernizing at a much faster pace than the software needed to keep up with them.

74% of organizations fail to complete legacy system modernization. Whether attempting a full migration to microservices or trying to unwind a dependency on an old, expensive database, some analysis is required.

Having worked on teams modernizing legacy applications to microservices, we’ve noticed the same patterns keep resurfacing. If the data model is relatively clean, modernizing applications is fairly straightforward. If the data model is a mess, what’s built on top of it probably is too.

An application’s data model is its destiny.

Join SD Times Editor-in-Chief David Rubinstein (LinkedIn profile) will moderate a discussion focusing on:

  1. Mapping the data-to-code relationships
  2. The impact data models have on the codebase
  3. Why it’s important to understand the data model before modernization

Click to register for:
It’s Data First When Modernizing Applications

0 0 1.0
Technical Project Management Leadership Strategic & Business Management

NOTE: For PMI® Audit Purposes – Print Out This Post!  Take notes on this page during the presentation and also indicate the Date & Time you attended. Note any information from the presentation you found useful to your professional development and place it in your audit folder.

TCP/IP Foundations

Share

Live Webinar – June 22nd 2021, 12:00 pm – 1:00 pm EDT
Activity Type: Education – Course or Training  1 Hour  1 PDU
Provider:  Global Knowledge UK  (REP 1999)

Despite rapid advances in technology, and widespread use of networks over the last few decades, the TCP/IP v4 is still the predominant protocol in use.

It is also quite surprising to see significant gaps or deficiencies in the foundational TCP/IP knowledge of many networking and IT professionals.

In this webinar Lane Williams attempts to highlight the common areas of such gaps and how to overcome them.

In this Webinar, you will learn:

  • Basics of TCP/IP protocol suite
  • Basics of IP, TCP, & UDP
  • Other Core protocols
  • Basics of Routing – overlaps with Networking Foundations webinar
  • TCP/IP Addressing & Subnetting – overlaps with Networking Foundations webinar
  • IPv6

Presenter:  Lane Williams (LinkedIn profile) is an experienced technical instructor with a demonstrated history of working in the professional training & coaching industry. He is skilled in hands-on training, captivate, learning management, educational technology, and instructional design. Lane has a master’s degree focused in Computer and Information Systems Security/Information Assurance from WGU Texas.

Click to register for:
TCP/IP Foundations

0 0 1.0
Technical Project Management Leadership Strategic & Business Management

NOTE: For PMI® Audit Purposes – Print Out This Post!  Take notes on this page during the presentation and also indicate the Date & Time you attended. Note any information from the presentation you found useful to your professional development and place it in your audit folder.

Move Fast & DON’T Break Things

Share

Live Webinar – June 16th, 2021 1:00 pm – 2:00 pm EDT
Activity Type: Education – Course or Training  1 Hour  1 PDU
Provider: SD Times (Software Development Times)

Modernize Your SDLC Without Compromising Customer Trust

Companies around the world and across a myriad of industries are feeling the pressures of evolving from legacy, on-prem infrastructure to hybrid and cloud-native architectures.

Meanwhile, both B2B and B2C buyers today demand faster delivery—whether of business or consumer-facing services. And with COVID-19 forcing a global shift to remote work, enterprises now have to govern and foster efficient collaboration across distributed teams while delivering reliably and securely.

Join the sd times Presenters for this engaging session.

Presenters:

Click to register for:
Move Fast & DON’T Break Things

0 0 1.0
Technical Project Management Leadership Strategic & Business Management

NOTE: For PMI® Audit Purposes – Print Out This Post!  Take notes on this page during the presentation and also indicate the Date & Time you attended. Note any information from the presentation you found useful to your professional development and place it in your audit folder.