Hi [[ session.user.profile.firstName ]]

IT Specialist Network

  • Date
  • Rating
  • Views
  • Building a Risk-Based Business Case for Cybersecurity
    Building a Risk-Based Business Case for Cybersecurity Johna Till Johnson, CEO & Founder, Nemertes Research Recorded: Jul 11 2018 54 mins
    Cybersecurity professionals do a great job when it comes to understanding, and mitigating, technical and functional risk.

    But CEOs and board members tend to think in terms of business risk. This webinar shows cybersecurity professionals how to articulate requirements in business terms. With that knowledge, they can build the case for cybersecurity tools, staffing, and initiatives in a way that business professionals will understand--and fund.
  • [Earn 1 CPE] Practical Steps to Scale Your Vendor Risk Management Program
    [Earn 1 CPE] Practical Steps to Scale Your Vendor Risk Management Program Rebecca Herold. Panel: Jake Olcott, BitSight; Todd Boehler, ProcessUnity; Matt Kunkel, LogicGate; Scott Schneider, CyberGRX. Recorded: Jun 26 2018 76 mins
    As organizations rely on third parties to grow and thrive, they’re exposed to major cybersecurity risks. Mitigating this risk means confronting the potential security vulnerabilities that are present in your third party network, but traditional vendor risk management (VRM) methods are no match for modern threats. According to Deloitte 83% of today’s business leaders lack confidence in third party VRM processes.

    Join our panel of experts on this CPE accredited webinar to learn how your organization can create a VRM program that’s ready and able to stand up to today's third party threat landscape.

    Learning objectives:

    • Find out how to gain executive leadership buy-in for your VRM program.
    • Learn how to perform quantifiable vendor security analyses.
    • Discover how to leverage Automation to Scale your VRM program.
  • IT Services Marketplace Demo
    IT Services Marketplace Demo Eric Lehto Recorded: Jun 6 2018 38 mins
    Demonstration of the Badged IT Services Marketplace and beta program overview.
  • The Future of GDPR: Compliance beyond Deadline Day
    The Future of GDPR: Compliance beyond Deadline Day Brian Rutledge (Spanning) | Kalani Enos (FARO Technologies) | Heather Stratford (Stronger.tech) Recorded: May 22 2018 60 mins
    May 25th 2018 is the deadline day for achieving General Data Protection Regulation (GDPR) compliance. It is also only the beginning of GDPR.

    Discover what GDPR means for your organization, how it affects US businesses and why it's important to be GDPR compliant.

    Join this interactive Q&A panel discussion with industry experts to learn more about:
    - The intersection of GDPR, privacy and cybersecurity
    - How GDPR affects data governance, breach disclosures and overall data protection
    - Recommendations for improving your organization's cyber resilience

    Speakers:
    - Brian Rutledge, Principal Security Engineer at Spanning
    - Kalani Enos, IT Security Manager, FARO Technologies
    - Heather Stratford, CEO of Stronger.tech
  • Metrics drive behaviours: How to avoid common IT metric mistakes
    Metrics drive behaviours: How to avoid common IT metric mistakes Steve Morgan, Director, Syniad IT Recorded: May 17 2018 33 mins
    As organisations seek to improve the quality of IT services, perhaps through SIAM or cloud provisioning, the traditional SLA targets and performance measures we hold dear are no longer appropriate.

    This talk will look at the common pitfalls and make some recommendations as to measures which will drive the correct behaviours in your internal and external support teams.
  • From Cost Center to Profit Center
    From Cost Center to Profit Center Phyllis Drucker - Consultant, Linium Recorded: May 16 2018 41 mins
    Cloud…outsourcing…Platform as a Service…all of these could make IT irrelevant, so how do you prevent this? By providing value every day and by running IT as a Business. Great catch-phrase, but what does it mean? In a nutshell: knowing the services IT is providing, what they cost to operate and whether they provide value, and by staying on the cutting edge of technology even with todays fast pace of change, so that the business you support remains competitive. This webinar addresses the basic building blocks you need to run like a business: defining services and offerings, layering in financial management and charge-backs/show-backs so you understand the costs of these offerings and how to pull it all together in a way that helps you run as a business does, even if it’s only on paper.
  • Running IT as a Business
    Running IT as a Business Rob Akershoek, Solutions Architect at Shell Recorded: May 16 2018 47 mins
    Rob Akershoek, Solutions Architect at Shell and part of the IT4IT Forum, discuss the challenges and opportunities of running IT as a business. Running IT as a business is more than finances and cutting cost – it’s about IT quality.
  • How to Demonstrate Value - The CSI Building Blocks
    How to Demonstrate Value - The CSI Building Blocks Ian MacDonald FBCS, CITP, FSM - Independent Consultant, Edenfield IT Consulting Recorded: May 16 2018 46 mins
    Today, simply meeting the service commitments of the business consistently may no longer be considered enough.

    Your business customers will over time have an expectation of increasing ‘value’ from their investment in the IT services you provide.

    Continual Service Improvement (CSI) provides an opportunity to exploit the insight, knowledge and skills of your people to identify and drive improvements to your IT services that add value to the customer and begin to positively influence their perception of getting value for money from their IT service provider.

    However, there is no value in CSI if the improvements provided are not focused on what your customer considers important to them. Equally, if the CSI improvements are not communicated to your customer and explained in a way that demonstrates tangible business value then this is a missed opportunity to demonstrate value and enhance customer satisfaction.

    In this session, we explore the essential ‘CSI Building Blocks’ required to ensure that CSI becomes a core capability for the IT service provider to demonstrate value for money from the IT services provided to their customers.

    This session will provide learning and guidance on:-
    The importance of demonstrating value to ensure commercial success….and the challenge for the IT Service Provider
    Understanding the concepts & characteristics of ‘value ‘
    Understanding how CSI can provide ‘Value Add’ and positively influence customer perception of value for money
    The essential ‘Building Blocks ‘ to enable CSI as an approach demonstrate the value provided from the IT Service providers people and capabilities

    The ‘CSI Building Blocks’ include the need to apply ‘Outside In’ thinking to your ITSM strategy, understanding the importance of purpose and contribution in motivating your people to drive CSI in the workplace, the importance of business measures to convey business value and the importance of a ‘target and tailor’ approach to customer communications.
  • Endpoint Security: The Right Balance Between Positive and Negative Approaches
    Endpoint Security: The Right Balance Between Positive and Negative Approaches Forrester Senior Analyst Chris Sherman and Nyotron's Senior Director of Product Management Rene Kolga Recorded: Apr 26 2018 58 mins
    Endpoint security represents the frontline in your fight against cybercriminals. Despite the relative maturity of the endpoint security market, new threats and evolving attacker capabilities have proven traditional approaches inadequate - and left organizations exposed.

    Guest speaker Forrester Senior Analyst Chris Sherman and Nyotron's Senior Director of Product Management Rene Kolga will discuss the current state of endpoint security while highlighting a path forward for organizations looking to re-focus their strategies to combat current threats.

    Attendees will learn:

    • Which threats are causing the most difficulties for traditional
    endpoint security approaches
    • Why organizations need to balance positive and negative security
    approaches
    •How to layer multiple tools for maximum protection
  • The hackers are winning: Deploy your secret weapon
    The hackers are winning: Deploy your secret weapon Rob Shapland, Principal Cyber Security Consultant, First Base Technologies Recorded: Apr 26 2018 46 mins
    How to make your staff your first and last line of defence.

    Learn how to:
    •Identify your enemy and their tactics
    •Discover why technological defences will lose to hackers
    •Learn how to make staff genuinely care about security

    About Rob Shapland BSc (Hons) OSCP OSWP CRT Principal Cyber Security Consultant, First Base Technologies

    Rob Shapland is an ethical hacker with 9 years’ experience conducting penetration tests for hundreds of organisations, from small businesses to major international organisations.
    He specialises in simulating advanced cyber attacks against corporate networks, combining technical attacks with his other hobby of dressing up and tricking his way into company headquarters using social engineering techniques.
    He is also a regular speaker at events and conferences around Europe, and has appeared on both BBC and ITV as a cyber security adviser. He holds qualifications from SANS, Offensive Security and CREST, and has been trained in social engineering techniques by Chris Hadnagy, one of the world's leading practitioners and researchers.

Embed in website or blog