Enterprise Videos

Cybersecurity Standards Scorecard (2025 Edition)
VideoMar 3, 2026

Cybersecurity Standards Scorecard (2025 Edition)

The webcast, hosted by veteran SANS instructor James Troll, introduces the 2025 edition of the Cybersecurity Standards Scorecard – an annual research effort that catalogues and evaluates the growing universe of cyber‑security frameworks. Troll notes that the SANS database now...

By SANS Institute
How RBC Capital Markets Is Transforming Client Onboarding
VideoMar 3, 2026

How RBC Capital Markets Is Transforming Client Onboarding

RBC Capital Markets is re‑engineering its client onboarding to position it as a competitive advantage rather than a mere compliance exercise. Lori Messer, global head of business and client services, emphasizes that a frictionless onboarding experience showcases the bank’s service...

By FF News | Fintech Finance
Black Hat USA 2025 |  Pwning User Phishing Training Through Scientific Lure Crafting
VideoMar 2, 2026

Black Hat USA 2025 | Pwning User Phishing Training Through Scientific Lure Crafting

A new eight‑month field study of over 20,000 employees reveals that conventional phishing awareness training fails to meaningfully reduce click rates. The research, presented at Black Hat USA 2025, shows that the success of phishing lures is erratic, with some...

By Black Hat
How Coinbase Scaled AI to 1,000+ Engineers | Chintan Turakhia
VideoMar 2, 2026

How Coinbase Scaled AI to 1,000+ Engineers | Chintan Turakhia

Coinbase engineering leader Chintan Turakhia says the company has successfully scaled AI across a 1,000+ engineer organization to boost velocity and rebuild a major consumer-facing app under an aggressive six- to nine-month timeline. Adoption succeeded after leadership became hands-on with...

By How I AI
The MCP Security Risks You Can't Afford to Ignore
VideoMar 2, 2026

The MCP Security Risks You Can't Afford to Ignore

MCPTotal CTO Ariel Shiftan warned that MCP (Model Connector Protocol) servers—tools that let LLMs access private APIs and data—pose serious enterprise security risks. His team has discovered zero-day vulnerabilities in widely used MCP servers and routinely finds malicious or highly...

By Tech Lead Journal
How to Build a Voice of the Customer Playbook? | CIO Talk Network
VideoMar 2, 2026

How to Build a Voice of the Customer Playbook? | CIO Talk Network

The CIO Talk Network episode dives into how organizations can construct a Voice of the Customer (VoC) playbook that turns raw feedback into actionable insight. Host Sanjal interviews Dwayne Lion of Vivele Data Solutions, who clarifies that VoC focuses on...

By CIO Talk Network
Omphile Matheolane Speaking at DDD Europe
VideoMar 2, 2026

Omphile Matheolane Speaking at DDD Europe

Omphile Matheolane’s presentation at DDD Europe centered on applying domain‑driven design to large‑scale financial applications. He argued that the first step is to delineate clear bounded contexts—such as accounts and loans—so each domain owns its data and logic without over‑reaching...

By Domain-Driven Design Europe
Lesson 217 - Supervisor Consumer Pattern
VideoMar 1, 2026

Lesson 217 - Supervisor Consumer Pattern

The video introduces the Supervisor Consumer pattern, a scalability technique that lets a single service handle fluctuating loads by automatically spawning and retiring consumer threads. Mark Richards explains that a dedicated supervisor component continuously polls an event queue, assesses the...

By Software Architecture Monday (Mark Richards)
SAP's AI Leap With NVIDIA Partnership & Future Predictions #shorts
VideoMar 1, 2026

SAP's AI Leap With NVIDIA Partnership & Future Predictions #shorts

SAP announced a strategic partnership with NVIDIA to speed up its artificial‑intelligence initiatives. The collaboration gives SAP access to NVIDIA's GPU and software stack while hinting at a longer‑term goal of developing proprietary AI technology. Executives compare this move to...

By Third Stage Consulting Group
Why Is a WAF No Longer Enough?
VideoMar 1, 2026

Why Is a WAF No Longer Enough?

Enterprises are discovering that traditional Web Application Firewalls (WAFs) no longer provide sufficient protection against today’s complex threat landscape. The video explains that a WAF, originally designed to filter malicious HTTP traffic, is an outdated term as application security now...

By David Bombal
Black Hat USA 2025 | If Google Uses It to Find Webpages, We Can Use It to Find Fraudsters
VideoFeb 28, 2026

Black Hat USA 2025 | If Google Uses It to Find Webpages, We Can Use It to Find Fraudsters

The session at Black Hat USA 2025 introduced a surprisingly simple technique—term‑frequency inverse‑document‑frequency (TF‑IDF)—as a powerful tool for spotting fraudsters, positioning it as an alternative to the sophisticated AI browsers and agents that dominate today’s web search. Speakers argued that generative...

By Black Hat
Enterprise-Ready MCP // Jiquan Ngiam
VideoFeb 28, 2026

Enterprise-Ready MCP // Jiquan Ngiam

The Coding Agents Conference on March 3 will feature Jiquan Ngiam discussing the rapid enterprise adoption of agents and Model Context Protocols (MCPs). Over 80 % of professional developers now use AI tools daily, and agentic coding platforms such as Claude Code...

By MLOps Community
Techstrong TV - February 27, 2026
VideoFeb 28, 2026

Techstrong TV - February 27, 2026

Techstrong TV featured Nikquille Hondigal, co‑founder and Chief AI Officer of Forward Networks, to discuss the company’s evolution from a software‑defined networking (SDN) startup to an AI‑enabled network operations provider. Founded twelve years ago by Stanford PhDs, Forward Networks has...

By Techstrong TV (DevOps.com)
Anthropic Vs. The Pentagon + AI Agents Are Rewriting Software | TSG Ep. 1029
VideoFeb 28, 2026

Anthropic Vs. The Pentagon + AI Agents Are Rewriting Software | TSG Ep. 1029

The episode centers on a high‑stakes standoff between Anthropic and the U.S. Department of Defense over a $200 million contract to supply the Claude model. The Pentagon seeks fewer guardrails, while Anthropic insists on a strict human‑in‑the‑loop policy for any weaponized...

By Techstrong TV (DevOps.com)
Identify, Scope, and Build an Agentic Workflow in N8n with Max Tkacz
VideoFeb 27, 2026

Identify, Scope, and Build an Agentic Workflow in N8n with Max Tkacz

The video walks viewers through building an AI‑driven, agentic workflow in n8n, starting with a live demo that automates a repetitive competitor‑monitoring task. Max Tkacz emphasizes a disciplined triage process—evaluating potential automations on time saved, feasibility, risk of damage, and...

By O’Reilly Media
Black Hat USA 2025 | Let LLM Learn: When Your Static Analyzer Actually 'Gets It'
VideoFeb 27, 2026

Black Hat USA 2025 | Let LLM Learn: When Your Static Analyzer Actually 'Gets It'

The Black Hat presentation explored how large language models (LLMs) can be fused with traditional static analysis tools to create a new generation of vulnerability scanners. The speaker outlined three integration patterns—AI‑enhanced, where a static scanner filters LLM output; AI‑explorer,...

By Black Hat
Modernizing Systems, Streamlining Processes & Delivering Services
VideoFeb 27, 2026

Modernizing Systems, Streamlining Processes & Delivering Services

Acting CIO Debbie Stephens of the U.S. Patent and Trademark Office joined Scoop News Group’s Billy Mitchell at a GDIT Emerge session to discuss modernizing legacy systems. She emphasized moving beyond mere technology deployment to achieve genuine adoption, highlighting artificial...

By FedScoop
How Finastra Is Redefining the Operating Model in Trade Finance
VideoFeb 27, 2026

How Finastra Is Redefining the Operating Model in Trade Finance

The video outlines how Finastra is reshaping the operating model for trade finance amid sweeping regulatory reforms that now recognize electronic documents as legally equivalent to paper. Banks across Europe, the United States, the Middle East and Southeast Asia...

By FF News | Fintech Finance
Government eDiscovery Needs and Challenges I CIO Talk Network
VideoFeb 27, 2026

Government eDiscovery Needs and Challenges I CIO Talk Network

The CIO Talk Network interview spotlights the growing complexity of eDiscovery within the U.S. Department of Justice’s Civil Division. Host Sanjok speaks with Allison Stanton, the newly created Director of eDiscovery, to explore how the federal government tackles both affirmative...

By CIO Talk Network
AI Success Is About Learning Not Output | Platform Engineering Meetup Highlight
VideoFeb 27, 2026

AI Success Is About Learning Not Output | Platform Engineering Meetup Highlight

The Platform Engineering meetup highlighted a shift in AI strategy: success hinges on continuous learning rather than sheer output volume. Speakers warned that the industry’s rush to “move at AI speed” must be tempered by robust safety and security practices,...

By Platform Engineering (community)
Expert Witness Reveals Lessons
VideoFeb 27, 2026

Expert Witness Reveals Lessons

The live discussion centered on the anatomy of ERP failures, with Eric Kimberling of Third Stage Consulting introducing Fred Hler, director of the firm’s expert‑witness practice. The conversation highlighted that ERP implementations fail at alarming rates—often quoted above 80%—and that...

By Third Stage Consulting Group
Komed Health: Hospital Coordination Made Easy Like WhatsApp | MedTech World Middle East 2026
VideoFeb 27, 2026

Komed Health: Hospital Coordination Made Easy Like WhatsApp | MedTech World Middle East 2026

Komed Health, a Swiss startup led by CEO Louisa Dober, has built an orchestration “coordination execution” layer that links hospitals’ EMRs and clinical systems to a WhatsApp-like mobile interface for clinicians. Deployed in 29 hospitals across Switzerland and Germany with...

By MedTech World
Founder Shares His RevOps #AI Stack
VideoFeb 26, 2026

Founder Shares His RevOps #AI Stack

Founder Peter Fuller of The Workflow Academy disclosed the AI stack powering his RevOps practice, promising a 20‑30% efficiency lift. The toolkit combines Cerebro Analytics for dashboards, Lovable for app development, Moon Knox as a ChatGPT wrapper, and Anthropic’s Claude...

By RevOps Champions
Disconnects Cost More than Discounts.
VideoFeb 26, 2026

Disconnects Cost More than Discounts.

Future Finance hosts Paul Barnhurst and Glenn Hopper discuss with Riya Grover, CEO of Sequence, how unifying Configure‑Price‑Quote (CPQ) and billing eliminates revenue leakage between CRM and ERP systems. The episode highlights that contract details often get lost when sales...

By Paul Barnhurst
Consulting Vs. Software: Who Wins the IT Budget War? #shorts
VideoFeb 26, 2026

Consulting Vs. Software: Who Wins the IT Budget War? #shorts

The IT spending landscape is rapidly shifting, with organizations allocating more budget to software solutions than to traditional consulting services. Automation and artificial intelligence are accelerating this transition, enabling enterprises to implement scalable tools without extensive human advisory. As AI-driven...

By SaaStr
How He Built a €1.1B Giant - Interview with  Enrico Giacomelli, the Founder of Namirial
VideoFeb 26, 2026

How He Built a €1.1B Giant - Interview with Enrico Giacomelli, the Founder of Namirial

The EU Startups podcast features Enrico Giacomelli, founder of Italy’s digital‑trust specialist Namirial, which has grown into a €1.1 billion enterprise. Giacomelli walks through the company’s 30‑year journey from a modest paper‑selling venture in 1991 to a market‑leading platform for electronic...

By OnStartups
The 229 Podcast: AI Governance Webinar with Dr. James McCabe, Dr. Ben Hohmuth, and Kristen Myers
VideoFeb 26, 2026

The 229 Podcast: AI Governance Webinar with Dr. James McCabe, Dr. Ben Hohmuth, and Kristen Myers

The 229 Podcast episode convened senior clinicians from Jefferson Health, Geisinger and Northwell Health to map an enterprise‑wide AI governance playbook. Panelists described how their CEOs have elevated artificial intelligence to a strategic imperative, linking it to cost reduction,...

By This Week Health
Black Hat USA 2025 | Conjuring Hardware Failures to Breach CPU Privilege Boundaries
VideoFeb 25, 2026

Black Hat USA 2025 | Conjuring Hardware Failures to Breach CPU Privilege Boundaries

The Black Hat talk spotlights machine‑check exceptions (MCEs) – hardware‑level fault signals that fire when a CPU detects catastrophic errors such as cache corruption, thermal trips, or external interference. Christopher Domas demonstrates that, unlike ordinary interrupts, MCEs cannot be masked,...

By Black Hat
Patch THIS Vulnerability in 10 Seconds
VideoFeb 25, 2026

Patch THIS Vulnerability in 10 Seconds

A critical Chrome zero‑day vulnerability is being actively exploited in the wild, and Google has released an emergency patch. The flaw, a use‑after‑free bug in Chrome’s rendering engine, allows attackers to execute arbitrary code simply by getting a user to...

By Simply Cyber
How Encompass Is Transforming Corporate KYC and Digital Identity
VideoFeb 25, 2026

How Encompass Is Transforming Corporate KYC and Digital Identity

The video features an interview with Alex, a senior executive at Encompass, recorded at day four of CybOS Frankfurt 2025. He outlines how the Australian‑born fintech is reshaping corporate know‑your‑customer (KYC) processes and digital identity solutions for institutional clients. Encompass began...

By FF News | Fintech Finance
Gemara: GRC Engineering Model for Automated Risk Assessment | OpenSSF Project Spotlight
VideoFeb 25, 2026

Gemara: GRC Engineering Model for Automated Risk Assessment | OpenSSF Project Spotlight

Jamara, the GRC Engineering Model for Automated Risk Assessment, is an OpenSSF‑hosted open‑source project that defines a multi‑layer logical model for integrating governance, risk, and compliance (GRC) directly into software engineering pipelines. Its purpose is to replace fragmented, tool‑specific data...

By OpenSSF
590 - From Patient Flow to Operational Efficiency: Optimising Workflows at the Enterprise Level
VideoFeb 25, 2026

590 - From Patient Flow to Operational Efficiency: Optimising Workflows at the Enterprise Level

Talking Health Tech’s latest episode spotlights Roland’s enterprise‑level Concentric Care platform, designed to streamline patient flow and boost operational efficiency across hospitals. Executive Director Steve Gomes explains how a 25‑person engineering team in Victoria has built a middleware layer that...

By Talking HealthTech
Why Smartstream Is Doubling Down on AI and Customer Success
VideoFeb 25, 2026

Why Smartstream Is Doubling Down on AI and Customer Success

SmartStream CEO Ak Jaffa announced a strategic push to double down on artificial intelligence and customer‑success initiatives, positioning the firm’s brand to reflect a blend of AI and human intelligence delivering measurable value. The company will continue heavy R&D spending, rebranding...

By FF News | Fintech Finance
Best Practices Badge for Free/Libre and Open Source Software | OpenSSF Project Spotlight
VideoFeb 25, 2026

Best Practices Badge for Free/Libre and Open Source Software | OpenSSF Project Spotlight

David Wheeler, director of open‑source supply‑chain security at the OpenSSF, introduced the OpenSSF Best Practices Badge – a three‑tier (passing, silver, gold) certification that evaluates open‑source projects against a curated set of security‑focused criteria drawn from well‑run repositories. The badge...

By OpenSSF
Turning Threat Intelligence Into Real-World Action | 2 Cyber Chicks S8 E1
VideoFeb 25, 2026

Turning Threat Intelligence Into Real-World Action | 2 Cyber Chicks S8 E1

In the latest 2 Cyber Chicks episode, Karla Reffold, Chief Insights Officer at Surefire Cyber, explains how threat intelligence can move from static data to actionable insight during high‑pressure incidents. She emphasizes the need for concise, context‑rich intel that aligns...

By Simply Cyber
EDiscovery Best Practices and Trends I CIO Talk Network
VideoFeb 25, 2026

EDiscovery Best Practices and Trends I CIO Talk Network

The CIO Talk Network episode reframes eDiscovery as a strategic data‑governance and risk‑management function rather than a purely reactive legal task. Vivian Tero of IDC and host Sanjog Aul discuss enterprise confidence gaps, the surge of AI‑driven automation, and the...

By CIO Talk Network
The #1 Executive Blind Spot
VideoFeb 25, 2026

The #1 Executive Blind Spot

Executives routinely underestimate how consuming enterprise resource planning (ERP) implementations are, treating them like routine IT upgrades instead of operational overhauls that demand sustained senior and key-user engagement. Consultants say clients must participate deeply—defining requirements, testing, making rapid decisions and...

By Third Stage Consulting Group
Black Hat USA 2025 | Enhancing Command Line Classification with Benign Anomalous Data
VideoFeb 25, 2026

Black Hat USA 2025 | Enhancing Command Line Classification with Benign Anomalous Data

Sophos researchers presented a novel pipeline that pairs anomaly detection with large language models to harvest benign command‑line examples for supervised classification. Instead of relying on unsupervised anomaly detection to flag malicious inputs, the approach uses the detector to surface...

By Black Hat
Podcast Ep262: Microsoft’s Bundling Regulatory Issues, Best SI's In the Market, SAP RISE
VideoFeb 24, 2026

Podcast Ep262: Microsoft’s Bundling Regulatory Issues, Best SI's In the Market, SAP RISE

Episode 262 of the Transformation Ground Control podcast dives into three core topics: Microsoft’s ongoing bundling regulatory challenges, a discussion on the top system integrators in the market, and an overview of SAP’s RISE offering. Host Eric Kimberling and guest...

By Third Stage Consulting Group
Black Hat USA 2025 | FACADE: High-Precision Insider Threat Detection Using Contrastive Learning
VideoFeb 24, 2026

Black Hat USA 2025 | FACADE: High-Precision Insider Threat Detection Using Contrastive Learning

Google unveiled Facade, a self‑supervised AI system that detects insider threats by analyzing contextual patterns in corporate logs. Leveraging contrastive learning on exclusively benign data, Facade achieves unprecedented accuracy, reporting false‑positive rates below 0.01% and as low as 0.0003% for...

By Black Hat
The AI Divide Global Politics Agent Identity and Kubernetes | TSG Ep. 1026
VideoFeb 24, 2026

The AI Divide Global Politics Agent Identity and Kubernetes | TSG Ep. 1026

The Techstrong Gang dissected a new AI innovation pledge signed by 88 nations that emphasizes market expansion while omitting enforceable safety standards. The hosts debated how this signals a fragmented global governance landscape and reshapes competitive dynamics among superpowers. They...

By Techstrong TV (DevOps.com)
AI Agent Sandboxes: Securing Memory, GPUs, and Model Access
VideoFeb 24, 2026

AI Agent Sandboxes: Securing Memory, GPUs, and Model Access

AI agents expand the attack surface beyond traditional microservices by accessing models, memory, GPUs, and external tools, making conventional container isolation inadequate. Industry leaders discussed how lightweight VM‑based sandboxes, such as those built on Kata, can provide stronger isolation, limit...

By OpenInfra Foundation
Techstrong TV - February 24, 2026
VideoFeb 24, 2026

Techstrong TV - February 24, 2026

Techstrong TV’s February 24 2026 episode spotlighted the rapid convergence of AI and enterprise infrastructure. RUCKUS President Bart Giordano explained how AI‑driven applications and edge workloads are forcing a rewrite of wireless performance, reliability, and security. Microsoft’s Tiffany Treacy and Keith Kirkpatrick...

By Techstrong TV (DevOps.com)
Cybersecurity Careers: Penetration Tester (4 of 9 Careers)
VideoFeb 24, 2026

Cybersecurity Careers: Penetration Tester (4 of 9 Careers)

The video introduces penetration testing as the offensive counterpart to defensive security roles, highlighting its focus on discovering and exploiting weaknesses across hardware, software, networks, policies, and people. Kean Evans explains that entry‑level testers start with automated scans, then progress to...

By Infosec Institute
How Red Hat Is Using Open Source to Power the Future of Banking
VideoFeb 24, 2026

How Red Hat Is Using Open Source to Power the Future of Banking

Red Hat is positioning open‑source technologies as the backbone of modern banking infrastructure, offering secure, compliant platforms for cloud‑native transformation. The company showcases its enterprise‑grade Red Hat Enterprise Linux and OpenShift solutions, which bridge community innovation with strict financial regulations....

By FF News | Fintech Finance
Episode 2: From CIO Initiative to C-Suite Priority: Governing AI for Enterprise Impact
VideoFeb 24, 2026

Episode 2: From CIO Initiative to C-Suite Priority: Governing AI for Enterprise Impact

Leaders from Skyward, Nationwide and veteran CIOs warned that while AI's potential is real, most pilots stall without C‑suite and board alignment, clear governance and a scalable operating model. Skyward’s CEO described moving from experimental proofs to enterprise deployment by...

By CIO (Foundry)
AI Chips, Software Profit & Atlassian's Growth HACK! #shorts
VideoFeb 24, 2026

AI Chips, Software Profit & Atlassian's Growth HACK! #shorts

The short‑form video stitches together a rapid‑fire commentary on the current state of SaaS growth, AI‑chip economics and Atlassian’s latest earnings, highlighting how profit and revenue stacks are being reshuffled amid the AI boom. Atlassian reported a 23 % year‑over‑year revenue increase...

By Jason Lemkin
Could IBM's Software-and-AI Pivot Re-Rate Its Stock?
VideoFeb 23, 2026

Could IBM's Software-and-AI Pivot Re-Rate Its Stock?

IBM has repositioned itself as a software‑led, platform business centered on hybrid cloud, artificial intelligence and quantum computing. Over the past three years the pivot delivered roughly 1,000 basis points of operating‑margin expansion and about $5 billion of incremental free cash...

By The Motley Fool
Unseen Devices in Your Network
VideoFeb 23, 2026

Unseen Devices in Your Network

The video highlights how organizations routinely overlook a significant portion of devices on their networks, exposing a blind spot in cybersecurity defenses. Speakers reveal that roughly 10‑12% of assets are completely unknown, and among the known inventory, about 12% lack endpoint...

By Paul Asadoorian