Best Practices for Securing the Enterprise in Today's Collaboration

Total Page:16

File Type:pdf, Size:1020Kb

Best Practices for Securing the Enterprise in Today's Collaboration Best Practices for Securing the Enterprise in Today’s Collaboration-Based World A New Multi-Sponsor Survey, eGuide and Lead-Generation Program In Collaboration with Effectus Media Group, LLC Optional Participation in a Virtual Summit Project OR-JULYESC Effectus Media Group, LLC 2901 West Coast Highway, Suite 200 Newport Beach, CA 92663 C O N F I D E N T I A L WHO SHOULD CONSIDER THIS PROGRAM? This program is intended for sponsorship by any vendor that provides solutions designed to protect collaboration applications and data stores from advanced threats like phishing, ransomware and CEO Fraud/Business Email Compromise/whaling (BEC). Even smaller organizations can use in excess of 100 collaboration applications, including Microsoft Office 365, Microsoft Teams, Slack, Skype, Box, Google Apps, GotoMeeting, and Docusign, as well as a host of apps for individual departments. The intended audience for the eGuide will be decision makers and influencers in mid- sized and large organizations who are charged with evaluating and selecting security solutions. The goal of this program will be to help decision makers and influencers understand the risks of a growing number of collaboration applications, the growing volume of data that they contain, and the growing number and sophistication of advanced threats that can put corporate data at risk. In short, within this threat landscape, what are the best practices enterprises can employ and how can IT organizations regain control of their environments? OVERVIEW Vertical and horizontal collaboration applications with enterprises are now growing by leaps and WHAT THIS PROGRAM bounds. These applications go well beyond just INCLUDES: social networks, but include unified communications, document and workflow A mini-survey of management, and mobile and remote device corporate decision makers connectivity that can serve all employees. and influencers. Surveys of various functional areas, such as marketing departments, have demonstrated that An eGuide that will be these functions can employ in excess of 100 custom branded for each collaboration applications. sponsor. In a world where collaboration is becoming more A survey report that will be important, cybercriminals are continuing to published following leverage traditional channels like email, but now publication of the eGuide. increasingly find and exploit vulnerabilities in applications that traditional IT departments may 150+ leads provided to have never used. Organizations that don’t fight sponsors from those who back with a comprehensive strategy, which download the eGuide. includes the latest technologies, are at greater risk of security breaches than ever before. To better understand these issues, Osterman Research will execute a short survey of Security and IT decision makers and professionals as part of this program to understand Effectus Media Group, LLC C O N F I D E N T I A L the key issues and to identify best practices to secure organizations in today’s collaboration-based world. Vendors who sponsor this program will: □ Be included in the Osterman Research version of the eGuide with an overview of their solution(s). □ Receive 150 leads. □ Receive their own custom-branded version of the eGuide for use in their own marketing. Optionally, vendors can also participate in a Virtual Summit on the same topic: □ Present for approximately 30 minutes on an online conference in late September 2018. □ Receive 350 additional leads (500 total). □ Receive a video of their presentation for use in their own marketing. SUMMARY Project: This program will consist of four deliverables: 1. A survey specifically focused on understanding how enterprises are securing collaboration applications. 2. An eGuide that discusses the survey results and offers detailed, best practices guidance for securing the enterprise in a collaboration-based world. Sponsors will be able to review and provide feedback on the eGuide outline and survey questionnaire, as well as each draft of the eGuide. 3. A lead-generation program that will generate a minimum of 150 leads from those who download the eGuide. 4. A survey brief to be published shortly after the eGuide to present additional data from the survey and to generate additional leads. Audience for the eGuide: IT and business decision-makers in organizations of all sizes who are charged with influencing the selection and/or purchase of security solutions. Deliverables: Osterman Research will produce two versions of the eGuide in addition to the complete set of survey results in a separate report that can be published by each sponsor: Effectus Media Group, LLC C O N F I D E N T I A L □ An eGuide with all sponsors’ logos and company descriptions. □ Another version of the eGuide customized for each sponsor with only its logo and company description. The eGuide for this program will be completed in August 2018. OBJECTIVES AND STATEMENT OF WORK Option A: Osterman Research proposes to carry out the following tasks for this program: □ Develop the initial mini-survey questionnaire and eGuide outline for review and feedback from all sponsors. □ Conduct the mini-survey with a minimum of 100 decision makers and influencers in organizations of 1,000 or more users and provide the complete survey results to all sponsors. □ Produce the eGuide, each draft of which will be reviewed by, and feedback incorporated from, all sponsors. □ Osterman Research will promote the final, multi-sponsor version of the eGuide to its mailing list and through ITWhitePapers.com and/or equivalent media to achieve maximum distribution of the document. □ Sponsors will also be provided with a branded version of the eGuide that includes only their logo and write-up. Sponsors of the eGuide can distribute either version of the eGuide without limitation. □ A marketing program for the eGuide to support generation of a minimum of 150 leads will begin shortly after its publication date. Osterman Research anticipates that the 150-lead minimum will be met within 45 days after lead-generation efforts begin. However, leads will continue to be provided to sponsors beyond the minimum. □ Osterman Research will be available after the conclusion of this project to answer any questions that may arise. Effectus Media Group, LLC C O N F I D E N T I A L Option B: Osterman Research proposes to carry out the following tasks for the virtual summit portion of this program: Everything included in Option A above, plus: □ Sponsors will present for 30 minutes at a Virtual Summit on a topic related to the eGuide topic. □ A Virtual Summit to take place in late September with the marketing program for the Virtual Summit with actual tech media or equivalent media to generate 350 leads. □ Sponsors will receive a video of their presentation for their unlimited use in their marketing after the Virtual Summit date. TERMS AND CONDITIONS Option A Participation in this program will be $6,500 for subscribers to the Osterman Research Subscription Service (ORSS) 2018, or $7,000 for non-subscribers. Each sponsor of the eGuide will have its logo printed on the front cover of the document. Sponsors may distribute the eGuide and the survey results in their entirety without limitation. Each sponsor will have the opportunity to review the survey questionnaire, eGuide outline, and each draft of the eGuide before they are published as final, and any comments and amendments will be reasonably considered. Osterman Research warrants that all leads for the eGuide will have been generated in accordance with any applicable data laws. Osterman Research also warrants that all leads have confirmed to opting in to receive marketing communications from Osterman Research and any of the sponsors of this eGuide. Option B Option A above and participation in the Virtual Summit. Participation in this two-part program will be $12,500 for subscribers to the Osterman Research Subscription Service (ORSS) 2018, or $14,000 for non-subscribers. SCHEDULE Osterman Research will accept sponsors in July 2018 and provide the first draft of the eGuide outline for review and comment in August 2018. The eGuide will be targeted for completion in late August 2018, with distribution, advertising and lead-generation beginning immediately thereafter. The Virtual Summit will be scheduled for late September 2018 on a mutually agreeable date for all sponsors. Effectus Media Group, LLC C O N F I D E N T I A L OTHER FEES No other fees or expenses will be charged under this proposal without the advance, written approval of the sponsors of the eGuide, although no other fees are anticipated. DURATION OF THIS PROPOSAL This proposal is valid through July 31, 2018 or until all sponsorship slots are filled. QUALIFICATIONS OF OSTERMAN RESEARCH, INC. Osterman Research help vendors, IT departments and other organizations make better decisions through the acquisition and application of relevant, accurate and timely data on markets, market trends, products and technologies. We also help vendors of technology- oriented products and services to understand the needs of their current and prospective customers. Osterman Research provides timely and accurate market research, cost data, cost models, benchmarking information and other services to technology-based companies. We do this by continually gathering information from IT decision-makers and end-users of information technology. We analyze and report this information to help companies develop and improve the products and services they offer to these markets or to internal customers. Among the things that make Osterman Research unique is our market research panel: a large and growing group of IT professionals and end-users around the world with whom we conduct our research surveys. This allows us to conduct surveys quickly and accurately with very high response rates. We are continually developing our panel of IT professionals and end-users into one of the leading sources of information for companies that offer products and services in the IT space. Contact Francine Osora || Sr.
Recommended publications
  • Hacking the Master Switch? the Role of Infrastructure in Google's
    Hacking the Master Switch? The Role of Infrastructure in Google’s Network Neutrality Strategy in the 2000s by John Harris Stevenson A thesis submitteD in conformity with the requirements for the Degree of Doctor of Philosophy Faculty of Information University of Toronto © Copyright by John Harris Stevenson 2017 Hacking the Master Switch? The Role of Infrastructure in Google’s Network Neutrality Strategy in the 2000s John Harris Stevenson Doctor of Philosophy Faculty of Information University of Toronto 2017 Abstract During most of the decade of the 2000s, global Internet company Google Inc. was one of the most prominent public champions of the notion of network neutrality, the network design principle conceived by Tim Wu that all Internet traffic should be treated equally by network operators. However, in 2010, following a series of joint policy statements on network neutrality with telecommunications giant Verizon, Google fell nearly silent on the issue, despite Wu arguing that a neutral Internet was vital to Google’s survival. During this period, Google engaged in a massive expansion of its services and technical infrastructure. My research examines the influence of Google’s systems and service offerings on the company’s approach to network neutrality policy making. Drawing on documentary evidence and network analysis data, I identify Google’s global proprietary networks and server locations worldwide, including over 1500 Google edge caching servers located at Internet service providers. ii I argue that the affordances provided by its systems allowed Google to mitigate potential retail and transit ISP gatekeeping. Drawing on the work of Latour and Callon in Actor– network theory, I posit the existence of at least one actor-network formed among Google and ISPs, centred on an interest in the utility of Google’s edge caching servers and the success of the Android operating system.
    [Show full text]
  • Sustainability Report 2018
    SUSTAINABILITY REPORT 2018 English Version Sustainability Report 2018 Contents Disclosure of Sustainability-related Information ............................................................ 002 ●Sustainability Initiatives Through Business (KDDI’s Products and Services) ........ 035 Top Message ................................................................................................................. 003 Network Quality Management and Improvement ......................................................... 036 Message from Executive Officer of Sustainability ......................................................... 005 Responsibility for Products and Service ....................................................................... 039 Our Business and Strategies ......................................................................................... 006 Customer Relationship Management ............................................................................ 042 KDDI’s Commitment to Sustainability ........................................................................... 007 Brand Management ....................................................................................................... 045 KDDI Code of Business Conduct (Basic Principles) ..................................................... 009 Innovation Management ................................................................................................ 046 Sustainability Promotion Framework ...........................................................................
    [Show full text]
  • Hosting Solutions
    Hosting Hosting Solutions Whether you need a reliable home Colocation for your website or a more bespoke Host your own network and server equipment in a secure, purpose-built solution, we’ll provide you with data centre environment Dedicated Servers technically superior hosting, backed We’ll provide you with enterprise class server hardware, hosted in a purpose- by a personal approach to service built data centre and provide you with and support. full remote access Managed Hosting Let us design, build, manage and maintain a hosting solution, tailored to your specific needs, and hosted in one Reliable hosting services have been a feature of our service portfolio for over 10 of our purpose-built data centres years. Domain Names We provide a suite of hosting services out of our purpose-built data centres in Establish your presence on the Internet Rochdale and Leeds. We also have data centre presence in Manchester and London, and protect your brand all of which are connected to each other and the wider Internet by our resilient 10Gbps network. Resilient, high performance data storage is available thanks to our Web Hosting Build your own website using one of our investment in an enterprise class, multi-site Storage Area Network. affordable Web Hosting packages Building on these foundations, we partner with leading hardware and software vendors enabling us to provide end to end hosting solutions which meet the requirements of single users and small businesses, as well as large multi-site organisations looking to host mission critical service infrastructure. With a comprehensive range of hosting services on offer, and a thorough approach to understanding your requirements, we are ideally positioned to provide the right solution to your hosting needs.
    [Show full text]
  • Cisco 2007 Annual Security Report Contents Executive Summary
    Cisco 2007 Annual Security Report Contents Executive Summary . 2 Understanding Security in an Insecure World . 3 Vulnerability . 5 Key Recommendations . 12 What to Expect in 2008 . 13 Physical . .14 Key Recommendations . 17 What to Expect in 2008 . 18 Legal . 19 Key Recommendations . 20 What to Expect in 2008 . 20 Trust . 21 Key Recommendations . 22 What to Expect in 2008 . 22 Identity . 23 Key Recommendations . 24 What to Expect in 2008 . 24 Human . 25 Key Recommendations . 26 What to Expect in 2008 . 26 Geopolitical . .27 Key Recommendations . 29 What to Expect in 2008 . 29 Conclusion . .30 Better Solutions for Responding to Evolving Security Threats . 33 Cisco 2007 Annual Security Report Executive Summary The Cisco® Annual Security Report provides an overview of the combined security intelligence of the entire Cisco organization. The report encompasses threat information and trends collected between January and September 2007, and provides a snapshot of the state of security for that period. The report provides recommendations from Cisco security experts and predictions of how identified trends will continue to unfold in 2008. Security trends and recommendations are organized into seven major risk categories: Vulnerability Physical Legal Trust Identity Human Geopolitical The report also provides a high-level perspective on the issues currently shaping the security space, as well as insights into how security professionals and businesses can expect the industry to change over the next several years. All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 2 Understanding Security in an Insecure World “Uncertainty is the only certainty there is, and knowing how to live with insecurity is the only security.” —John Allen Paulos, best-selling author1 The 21st century is characterized by a growing interconnectedness between businesses, governments, and individuals.
    [Show full text]
  • Watchguard Internet Security Report Q4 2020
    INTERNET SECURITY REPORT Quarter 4, 2020 Contents The Firebox Feed™ provides quantifiable 03 Introduction data and trends about hackers’ latest 05 Executive Summary attacks, and understanding these trends can help us improve our defenses. 06 Firebox Feed Statistics 08 Malware Trends 09 Overall Malware Trends 11 Most-Widespread Malware 13 Catching Evasive Malware 14 Individual Malware Sample Analysis 18 Network Attack Trends 19 Most-Widespread Network Attacks 21 Top 10 Network Attacks Review 22 Overall Geographic Attack Distribution 24 DNS Analysis 25 Top Malware Domains 27 Firebox Feed: Defense Learnings 28 Endpoint Threat Trends 30 Top Ransomware Variants in 2020 33 Endpoint Defense Learnings 34 Top Security Incident 35 SolarWinds Breach 39 Important Takeaways 40 Conclusion and Defense Highlights 43 About WatchGuard Internet Security Report: Q4 2020 • 2 Introduction The Q4 report covers: As digital technology has evolved and become much more Firebox Feed Threat Trends: interconnected, your individual company’s cybersecurity This section highlights the top malware, network posture has expanded to affect others far beyond just your own 06 attacks, and threatening domains we see targeting organization. This complex cyber-ecosystem means it’s now in customers. We break these results down both by your best interest to improve everyone’s cybersecurity stance, raw volume and by the most widespread threats, not just your own. I believe cybersecurity needs to become a while also giving a regional view. We also highlight community effort that creates a tide to lift all boats. individual standout threats, such as Emotet, Tesla Agent, the return of cryptominers, and an IoT trojan Both the pandemic and the SolarWinds breaches seeded my targeting consumer routers called The Moon.
    [Show full text]
  • CONFIDENTIAL Confidentiality Notice
    Central London and M25 Retail Colocation Market 2017 Corporate activity drives the market Report summary By Tim Anker, Director, The Colocation Exchange Ltd CONFIDENTIAL Confidentiality notice Version 1.2 This document contains confidential material solely for the purchaser. All reasonable precautionary methods in handling the document and the information contained herein should be taken to prevent any third party from obtaining access. No responsibility is taken by The Colocation Exchange Limited/Colo-X LLP for the use of this report by any third party. This work is based upon sources believed to be reliable, but the publisher does not warrant the accuracy or completeness of any information for any purpose and is not responsible for any errors or omissions. The views and opinions expressed in this report are solely those of the author. © Copyright 2017 The Colocation Exchange Limited/Colo-X LLP. All rights reserved. No part of the contents of this report may be reproduced or transmitted in any form by parties other than those employed or engaged by the purchaser, by any means without the written permission of The Colocation Exchange Limited or Colo-X LLP. Central London and M25 Retail Colocation Market 2017 2 Contents Confidentiality notice . 2 Report brief . 6 Methodology .............................................................................7 Report executive summary .................................................................8 Section 1: Market overview .................................................11 London colocation
    [Show full text]
  • (Public Pack)Agenda Document for Licensing Sub-Committee, 16/04
    Public Document Pack LICENSING SUB-COMMITTEE MEETING TO BE HELD IN CIVIC HALL, LEEDS ON TUESDAY, 16TH APRIL, 2019 AT 10.00 AM MEMBERSHIP Councillors H Bithell - Kirkstall; C Knight - Weetwood; G Wilkinson - Wetherby; Enquiries specific to Agenda compiled by: Entertainment Licensing: Governance and Scrutiny Support Stephen Holder Civic Hall Tel No: 0113 3785332 LEEDS LS1 1UR Tel No: 0113 3788662 Produced on Recycled Paper A CONFIDENTIAL AND EXEMPT ITEMS The reason for confidentiality or exemption is stated on the agenda and on each of the reports in terms of Access to Information Procedure Rules 9.2 or 10.4(1) to (7). The number or numbers stated in the agenda and reports correspond to the reasons for exemption / confidentiality below: 9.0 Confidential information – requirement to exclude public access 9.1 The public must be excluded from meetings whenever it is likely in view of the nature of the business to be transacted or the nature of the proceedings that confidential information would be disclosed. Likewise, public access to reports, background papers, and minutes will also be excluded. 9.2 Confidential information means (a) information given to the Council by a Government Department on terms which forbid its public disclosure or (b) information the disclosure of which to the public is prohibited by or under another Act or by Court Order. Generally personal information which identifies an individual, must not be disclosed under the data protection and human rights rules. 10.0 Exempt information – discretion to exclude public access
    [Show full text]
  • Company Job Title [PS]K Design Engineering Director 2Bm Owner
    Company Job Title [PS]K Design Engineering Director 2bm Owner 2bm General Manager 2bm Sales Director 2bm iMeter Product Manager 4NG Director A J Power UK Sales Manager ABB Specification & Projects Team ABEC Managing Director ABEC Contracts Manager (Major Projects) ABEC Operations Director ABEC Contracts Manager (Major Projects) ABEC Contracts Manager (Major Projects) ABM Critical Solutions Business Development Manager ABM Critical Solutions Operations Manager ACT Data Centre Fit Out Head of Pre-Construction ACT Data Centre Fit Out Business Development Manager Action BI Managing Director AECOM Director & MEP Practice Lead AECOM Technical Director AECOM Associate Director AECOM Senior Engineer AECOM Graduate Mechanical Engineer AECOM Engineer AECOM Electrical Engineer Aermec Business Development Partner Aermec Sales Specification Manager AF Preedcrete Managing Director AF Switchgear Regional Manager South AF Switchgear Group Business Development Manager EMEA AF Switchgear Sales Manager AF Switchgear Sales Director AF Switchgear Sales Manager AF Switchgear Technical Support Manager AF Switchgear Scottish Regional Sales Manager Aggreko Sector Development Manager Aggreko Global Data Centre Account Manager Ajartec Head Of Private Sector Alfa Laval Business Development and Specification Engineer Amazon Senior Colocation Infrastructure Engineer Amazon Data Centre Reliability Engineer (EMEA) Amazon Data Centre Global Expansion Engineer Anord Mardix VP of Sales - EMEA Anord Mardix Sales Director Anord Mardix LV Sales Manager Anord Mardix Sales Manager
    [Show full text]
  • How to Delist a Blacklisted IP Address
    How to delist a blacklisted IP address PROBLEM My IP address is blacklisted by some sender reputation RBL and emails are not delivered. How can I remove it form the blacklists? RBLs Our dedicated IP are only assigned to one account at a time, so we expect those users to take responsibility for all of the mail that is sent through their account. Please note: in the event that a sending domain (and not the IP address) is blacklisted, that domain’s controller will be responsible for handling the delisting request. RBLs are blacklists of IP addresses. One IP address enters into a blacklist for spamming activity. Here you can find instructions on what to do once the IP address entered into one or more blacklists. Why did you get into the blacklist in the first place? First of all, make sure you identified the reason for the blacklisting. If you didn’t identify and resolve it, you will just make things worse by asking for delisting. The IP will be quickly re-blacklisted and it will be harder to delist it. So, check why the IP has been blacklisted and fix the source of the problem before going ahead. Once you resolved all the problems (if it is a new IP address there is no problem to resolve, of course), you can go ahead with the delisting with the following instructions. First time cleanup If you just acquired this IP address, make sure that the dns reverse lookup is set before requesting removal from blacklists. When asked for a reason for requesting delisting, tell that you just acquired the IP address.
    [Show full text]
  • UK Communications Infrastructure Report 2011
    . Infrastructure Report The first Communications Infrastructure Report Publication date: 1 November 2011 (updated 20 December 2012) UK Communications Infrastructure Report 2011 Contents Section Page 1 Summary 1 2 Introduction and background to the report 6 3 Fixed networks 11 4 Mobile networks 21 5 Digital television 34 6 Digital radio 42 7 Resilience 46 8 Future developments 55 Annex Page 1 Data assumptions 63 2 Coverage data 66 3 Coverage maps 78 4 Glossary 89 UK Communications Infrastructure Report 2011 Section 1 1 Summary 1.1 The Digital Economy Act 2010 gave Ofcom a new duty to report to the Secretary of State for Culture, Media and Sport every three years on the state of the UK's communications infrastructure. In July, we published an initial report relating to broadband services delivered over fixed networks. This report and associated material published on Ofcom‟s website constitutes the remainder of the first report. 1.2 The report considers the coverage, capacity and resilience of the main public networks and services available in the UK, which includes fixed line and mobile telephony and broadband, digital radio and digital terrestrial TV. We have considered these from both a UK wide perspective and at the level of county / unitary authority. 1.3 The data we have collected from communications providers have highlighted a number of interesting findings. Network coverage 1.4 Broadband is now available on nearly every copper telephone line in the UK, however 14% of residential broadband connections are currently operating below the 2Mbit/s speed that government wishes to make available to virtually all homes by 2015.
    [Show full text]
  • Limited Trading As Aql Mr Martin John
    qryExportToContactsXLS Communications Provider Full Name (aq) Limited trading as aql Mr Martin John (aq) Networks Limited Ms Melissa Sherriff 08Direct Limited Mr Richard Griffiths 10ACT Limited Mr Andrew Baker 118 Limited Ms Emma Knight 2 Ergo Limited Mr Alan Leitch 24 Seven Communications Ltd Mr David Samuel 2Communications Limited Mr Tony McCann 2-Sell-It Ltd Mr Ray Barry 42 Telecom UK Limited Mr Johan Persson 4D Interactive Ltd Mr Nick Morgan A2B Telecom Limited Mr Lawrence Bingham Abel & Co (Scotland) Ltd Mr Max Ramyar ACN European Services Ltd Mr Paul Gagnier Affiniti Integrated Solutions Ltd Ms Lesa Green Aggregated Telecom Ltd Mr Phil O'Keeffe Airwave Solutions Ltd Mr Ian MacIver Aloha Telecommunications Mr Nathaniel Limited McInnes Alphatalk Ltd Mr Zafar Majid alwaysON Ltd Mr David Paulino Annecto Telecom Mr Franck Zaire API Telecom Limited Mr Nicholas Holland Atlantic Communications Corp Mr Chris Abbassy Ltd Atlas Interactive Group Limited Mrs Sue Hobson Bangla Trac Communication Mr Zainal Abedin Ltd Page 1 qryExportToContactsXLS Barritec Limited Miss Annabel Bowe Barritel Limited Miss Annabel Bowe Bellingham Mr James Parfrey Telecommunications Limited Bharti Airtel UK Limited Mr V Seetthraman Bicom Systems EURL Mr Nihad Skaljo British Sky Broadcasting Mr Paul King Limited Broadcast Telecom Ltd Mr Germaine Malcomb BT OnePhone Limited Mr Magnus Kelly Budget Numbers Ltd Mr James Goddard Business Broadcast Ms Victoria Harris Communications Ltd Business Service Provision Mr Anthony Company Limited Amissah Buzz Networks Limited Mr
    [Show full text]
  • Report Thank You to the 2018 Sponsors
    EUROPE 2018 23 - 25 October, London POST-EVENT REPORT THANK YOU TO THE 2018 SPONSORS HOST SPONSORS GOLD SPONSORS SILVER SPONSORS ASSOCIATE SPONSORS NETWORK TO BUSINESS EUROPE 2018 23 - 25 October, London VIEW THE HIGHLIGHTS FROM CAPACITY EUROPE 2018 Capacity Europe is one of the most important events in the international wholesale market. It’s a gathering place for decision makers and industry leaders, providing a great opportunity to meet most of our partners and customers at one location. It’s also a chance to examine upcoming trends and challenges and network with others in the field. Dr Rolf Nafziger, SVP, DEUTSCHE TELEKOM GLOBAL CARRIER Capacity Europe always provides a great opportunity for us to connect with our customers and partners, as well as to build new relationships. Equally important to me is being able to share experience and insight with our colleagues from across the carrier community on many of the hot topics impacting our industry, including Blockchain, digitalisation and IoT among others. Juan Carlos Bernal, CEO, International Wholesale Business, TELEFÓNICA EUROPE 2018 23 - 25 October, London THE STATISTICS 2,469 650 91 REGISTERED REGISTERED REGISTERED DELEGATES COMPANIES COUNTRIES 25% C-level, President, VP, SVP, EVP 30% Director & Head 33% Manager ATTENDEE LEVEL 5% Sales/Business Development Executive 7% Other of attendees were % director-level and 54 above COMPANY TYPE Voice Solutions 14% increase in number Telecoms Consultant / Analyst 4% of companies in 256 attendance at SMS Aggregator 2% Capacity Europe OTT /
    [Show full text]