Hi [[ session.user.profile.firstName ]]

ManpowerGroup: Experis - Midwest

  • Date
  • Rating
  • Views
  • The Agile PMO: Creating a Consistent Agile Project Management Culture
    The Agile PMO: Creating a Consistent Agile Project Management Culture Dennis Baldwin Recorded: Apr 27 2017 46 mins
    This presentation dispels rumors about Agile and PMOs being mutually exclusive items and discusses a revised role for the Traditional PMO in an Agile culture.
  • Digital Transformation: Educating and mobilizing your teams
    Digital Transformation: Educating and mobilizing your teams Steve Walker Recorded: Jan 26 2017 57 mins
    We will discuss the components of a digital maturity model, how your peers are viewing their maturity, and techniques on how to establish a culture of digital change.
  • The Road-Map to Analytics Maturity
    The Road-Map to Analytics Maturity Charles Kincaid Recorded: Dec 8 2016 53 mins
    Companies are using analytics to improve operations, reduce risk and increase revenue. The competitive advantage they are gaining comes from recognizing the value and the uniqueness of the data each company owns, instilling analytical processes into the standard operating procedures and building a culture that uses analytics as the standard for decision making. This presentation will introduce the audience to the power of analytics so that they will have the advantage over their competitors.
  • Out Of The Shadows - Can We Address The X Factors In Information Security
    Out Of The Shadows - Can We Address The X Factors In Information Security John Hainaut, Michael Gerdes Recorded: Sep 22 2016 56 mins
    Today’s media coverage provides an almost endless litany of stories describing emerging cyber threats, successful breaches and changing attack vectors facing businesses of all sizes, with many involving combinations of social engineering and advanced technological exploits. As a result, organizations and their customers are becoming convinced that even the most well-designed security programs are no match for the capabilities of today’s cyber security underworld.

    While advances in technology and processes have provided numerous risk management tools and safeguards that can be employed to help protect an organization’s vital information, their effectiveness is heavily dependent on the consistent application of controls and ethics of the people involved. Too often, organizations underestimate the level and type of risks that can arise from even the most well-intentioned and hard-working individuals, including those directly employed by the organization, contracted to provide third parties services and support, or even interacting with your company as customers. When combined with the potential risk factors brought on by bad actors, it is clear the human factor must be recognized as a key aspect of risk management in today’s complex corporate environments.

    This presentation will examine some notorious attacks and explore factors that lead to successful attacks and discuss significant issues and circumstances that lead to successful breaches.

    After the session, you will:
    •Develop a better understanding of the factors influencing today’s security threat landscape
    •Be able to recognize some latent or emerging security threats in your business environment   
    •Become aware of some practical approaches and solutions to consider when adjusting your risk management program to reduce your organization’s risk exposure

Embed in website or blog