Hi [[ session.user.profile.firstName ]]

Audit and Compliance

  • SkyStem: Spooky Tales from the SEC
    SkyStem: Spooky Tales from the SEC
    Nancy Wu, Sales and Customer Support, SkyStem Recorded: May 23 2019 56 mins
    [Live Recording] Join us in this webinar, where we arm ourselves with knowledge that can help our organization deter and detect organizational fraud. Learn the most common fraud practices, the best fraud detection and prevention activities, as well as recent SEC fraud cases.

    Please note: CPE credit not available for this playback
  • HIPAA Compliance
    HIPAA Compliance
    Lockpath Recorded: May 23 2019 2 mins
    HIPAA Compliance has many healthcare organizations struggling to keep up. Learn how the Keylight Platform is the solution you need for HIPAA compliance.
  • California Consumer Privacy Act: How Contact Centers Can Lead Compliance Efforts
    California Consumer Privacy Act: How Contact Centers Can Lead Compliance Efforts
    Thomas Chisena, Associate, Foley & Lardner LLP, Aaron Lumnah, Senior Manager, Demand Generation, Semafone Recorded: May 23 2019 42 mins
    Contact centers are the beating heart of organizations, serving as the frontline for customer communications and processing mountains of consumer data. However, with the passing of the California Consumer Privacy Act, new scrutiny will be placed onto the data security procedures of organizations processing the data of California citizens, presenting difficulties, as well as opportunities, for contact centers.

    Is your contact center prepared to comply with the CCPA? In this webinar, Semafone will be joined by data privacy expert, Thomas Chisena from Foley & Lardner LLP, where we’ll lay out a blueprint for contact centers to lead their organization’s compliance efforts, based on best practices for existing privacy legislation such as the GDPR and PCI DSS.

    We’ll cover the following:

    •The main provisions in the CCPA, what they mean, and how they apply to your company
    •Proposed amendments to the legislation that you need to pay attention to
    •An action plan of data security best practices to help your contact center comply

    Presenters
    Thomas Chisena, Associate, Foley & Lardner LLP
    Thomas Chisena is an associate with Foley & Lardner LLP, where he advises on all matters involving intellectual property and technology transactions, including licensing, procurement, outsourcing, and other technology law issues affecting companies of all sizes. He also advises on cybersecurity and privacy issues affecting all industries, including state, federal, and international laws and regulations. Prior to joining Foley, Mr. Chisena was an associate at an AmLaw 100 Boston-based law firm, where he focused his practice in the areas of intellectual property litigation, technology, and cybersecurity.

    Aaron Lumnah, Senior Manager, Demand Generation

    Aaron is a member of the Semafone marketing team, where he regularly contributes to the Semafone blog and authors many types of content around payment security, PCI DSS, and GDPR compliance.
  • Why You Should Use AI to Ditch These 5 Outdated Expense Policies
    Why You Should Use AI to Ditch These 5 Outdated Expense Policies
    Cauvery Mallangada, Customer Success Manager, AppZen Recorded: May 22 2019 33 mins
    From our experience implementing our AI-powered expense audit solution for over 1,000 companies, we’ve identified expense policies your company should seriously consider revisiting.

    Cauvery Mallangada, Customer Success Manager at AppZen, will discuss

    • How to re-think T&E policy
    • Create a healthy expense culture
    • How AppZen can help
  • Growth of Web Services & APIs and the Risks in M&A
    Growth of Web Services & APIs and the Risks in M&A
    Tony Decicco, GTC Law Group & Phil Odence, Synopsys Recorded: May 22 2019 61 mins
    Just like most software assets contain open source, modern software applications commonly link to external web services via APIs. By using web services, developers may be inadvertently signing their companies up to terms of service or using a web service without a suitable agreement. And using these services can expose a company to security, data privacy, and operational risks that could disrupt or severely affect the business. As part of the tech M&A due diligence process, you should be aware of these web services-related risks so that you can make informed decisions about deal valuation and remediation.

    Join Tony Decicco, shareholder at GTC Law Group and Affiliates, and Phil Odence, GM of Black Duck Audits, as they discuss the types of risk associated with web services and how they can affect an M&A transaction. They’ll cover:

    • Typical terms of service and common pitfalls
    • The legal compliance, data privacy, security, and business risks that come with web services
    • Real-world examples of these risks
    • How a buyer can get a better understanding of these risks in a target’s codebase or a seller can prepare for diligence to avoid risks in this area

    Don’t miss this informative webinar. Register today.
  • RPA – Project Governance and Internal Control Considerations for Internal Audit
    RPA – Project Governance and Internal Control Considerations for Internal Audit
    Jeff Butler, Director | Stephen Head, Director | Jay Smith, Director | Ed Williams, Director | Facilitator: Alec Arons, VP Recorded: May 22 2019 60 mins
    Experis Finance is pleased to announce the next session in our Hot Topics Series for Chief Audit Executives and their teams. This series of webinars provide practical insights on topics of interest to internal audit professionals. This panel discussion will cover Robotics Process Automation (RPA) and the key considerations for Internal Audit.

    RPA, robotics, robots, bots … as Internal Auditors you have undoubtedly been hearing this terminology tossed around more and more recently. What exactly is it; why should Internal Audit care; and what can we do to help our organizations embrace, adopt, control, and realize the benefits of this technology?

    The webinar will provide participants with the following learning objectives:

    • Discuss RPA in practical terms as companies begin to assess, plan and implement
    • Learn where RPA is providing the most benefit and return for organizations
    • Recognize the importance of effective Project Governance for RPA projects and what risks organizations should be thinking about
    • Highlight the role of internal audit in assessing the overall RPA plan and the downstream impacts on business processes and internal controls
    • Understand lessons learned and leading practices from successful RPA initiatives
  • Are you ready for SMCR?
    Are you ready for SMCR?
    SureCloud, Product Director, Alex Brown and Baringa, Senior Managers, Stephen Humphreys and Edouard Bassil Recorded: May 21 2019 60 mins
    The Senior Managers and Certification Regime (SMCR) presents some unique challenges to any financial services organization with the focus being on protecting consumers’ interests. With the implementation date set for December 2019, the countdown is on. In this webinar Baringa’s Senior Managers, Stephen Humphreys and Edouard Bassil will be discussing how FCA regulated firms should be preparing before the deadline. SureCloud’s Product Director, Alex Brown, will demonstrate how a suitable solution can operationalize your process and aid your compliance journey.

    The session will address key questions such as:
    •What actually are reasonable steps? Do I need a paper factory?
    •Can I be compliant by implementing a few new templates and input from a few people part-time?
    •Where are my biggest implementation risks? What might I get wrong?
    •How do I get value from the regime and my implementation approach?
  • Mobility, Productivity and Employee Engagement - How to have it all
    Mobility, Productivity and Employee Engagement - How to have it all
    Mark Elwood Recorded: May 21 2019 27 mins
    Research indicates mobile employees are more likely to feel anxious, isolated and have higher levels of technology related frustration than office-based staff. So, finding ways of connecting people, so they can be as productive, engaged and satisfied is key.

    Join us to find out how Re:Call is helping a major tier 1 bank deliver its digital transformation programme.

    What you will take away:

    • How digital transformation projects are creating more productive, mobile employees
    • How Re:Call is helping businesses take a new approach to mobile communications
    • What you can do to create connected, collaborative and productive employees.
  • GDPR One year later: Is a Risk-Based Approach to Data Privacy possible?
    GDPR One year later: Is a Risk-Based Approach to Data Privacy possible?
    Simon Rycroft, Principal Consultant, ISF and Kashif Barlas, Senior Consultant, ISF Recorded: May 20 2019 45 mins
    With businesses streamlining processes and automating customer service through outsourced arrangements, the volume and content of electronically transmitted personal data records has increased beyond all previous estimates. The sharing of special categories of data between businesses and their suppliers has become the norm, sometimes without adequate protection for the individual’s privacy in breach of the GDPR. Where there are hundreds of supplier contracts, it is not pragmatic for an organisation to review and tighten all these contracts immediately in the wake of the GDPR, however a risk-based approach can certainly reduce the compliance burden upon existing teams.

    In this seminar, we introduce the concept of a minimum viable product for this aspect of data privacy and describe how it can be aligned with an organisation’s risk appetite and agreed before prioritising and mitigating data privacy risks.
  • Disrupting the Payment Sector
    Disrupting the Payment Sector
    Rob Parker-Cole, Dr. Heiko Klarl Recorded: May 20 2019 54 mins
    Payment Service Directive 2 was inured in 2018 by the European Commission to enable a competitive, regulated environment for banking and non-banking organizations within the European Union. Competitive markets such as China’s fast growing mobile payment market, Australia’s New Payment Platform, and evolving FinTech Start-ups strongly impact the disintermediation of payment transactions, disrupting the banking sector globally. The need for fulfilling future customer needs by providing convenient payment solutions demand for faster adoption, agile methods and MVP (Minimal Viable Product) approaches that must lead to cultural changes in the banking sector to keep up with the market. How can one bank bear up to the competing environment by investing in digital payment solutions without losing control over regulation and cost?
  • Allgeier ES integriert SAP Concur in seine Cloud-Strategie
    Allgeier ES integriert SAP Concur in seine Cloud-Strategie
    SAP Concur Recorded: May 17 2019 3 mins
    Als Full-Service Partner für innovative IT-Lösungen verpflichtete sich Allgeier Enterprise Services selbst zu einer umfassenden Cloud-Policy. Beim Geschäftsreisemanagement setzt das Unternehmen auf Lösungen von SAP Concur, die sich nahtlos in die IT-Landschaft einfügen. Hören Sie in diesem Video-Interview, warum sich Allgeier für SAP Concur entschieden hat.
  • Penta Hotels setzt mit SAP Concur auf Komfort im Geschäftsreisemanagement
    Penta Hotels setzt mit SAP Concur auf Komfort im Geschäftsreisemanagement
    SAP Concur Recorded: May 17 2019 3 mins
    Penta bündelt die administrativen Aufgaben in der Zentrale. Dafür brauchte die Hotelkette eine innovative Lösung wie Concur Expense, die das Geschäftsreisemanagement effizient und genauso bequem gestaltet wie die Übernachtung im Pentahotel. Hören Sie in diesem Kundenbeispiel, warum sich Penta Hotels für SAP Concur entschieden hat.
  • Eine professionelle Lösung für die vielreisenden Berater von projekt0708
    Eine professionelle Lösung für die vielreisenden Berater von projekt0708
    SAP Concur Recorded: May 17 2019 3 mins
    projekt0708 setzt mit SAP Concur auf eine Verschlankung von Prozessen für die vielreisenden Berater. Hören Sie in diesem Video-Interview, warum sich das Unternehmen für SAP Concur entschieden hat.
  • Weg von Insellösungen: So gelingt ein integriertes Reisemanagement bei dormakaba
    Weg von Insellösungen: So gelingt ein integriertes Reisemanagement bei dormakaba
    SAP Concur Recorded: May 17 2019 2 mins
    Die dormakaba International Holding AG setzt mit SAP Concur auf ein vollautomatisiertes, standortübergreifendes und integriertes Reisemanagement. Hören Sie in diesem Video-Interview, warum sich der Sicherheitstechnikspezialist für SAP Concur entschieden hat.
  • Who should setup access in the ERP (Financial Application)?
    Who should setup access in the ERP (Financial Application)?
    Donald E. Hester; Robert DeRoeck; Ron Puccinelli Recorded: May 16 2019 63 mins
    As an IT auditor for local governments, one of the most often asked I get during audits is who should setup user access in the financial application. There is a debate of whether it should be IT or finance staff that create accounts and setup access. As with any professional my answer is it depends. It depends upon other controls that might be in place. What I like to do with clients is walk them through the needs and risks to help them design and understand the process they come up with. Let’s walk thought the logic and see what might be the best answer for your organization. Plus, we will answer a question from a listener on hacking Instagram accounts.

    Coverage
    NIST CSF, NIST SP 800-53, PCI DSS, COBIT, ISO 27001, COSO
    IT, Cloud
  • Audit Management for 2020 and Beyond
    Audit Management for 2020 and Beyond
    Sam Abadir, Lockpath Recorded: May 16 2019 41 mins
    As business risks and compliance mandates keep changing, audit teams are having a tougher time prioritizing audits, collecting information and performing analysis required to strengthen the business.

    Businesses are facing more regulations and competitive pressures which increase the need for internal audit teams to provide an orderly approach for evaluating and improving the effectiveness of risk management, internal control, and governance processes to improve the organization.

    Audit teams are being challenged by legacy audit processes that do not evolve at the same speed as business and regulations. These legacy audit processes include the use of spreadsheets, manual evidence requests, share drives and manual reports that often take weeks or months to complete.

    In this live webinar, Lockpath’s Sam Abadir will share what audit management for 2020 and beyond looks like, including:

    • What audit management encompasses
    • How your organization can gain efficiency from proper audit management
    • Advantages of managing audits and risk management efforts on an Integrated Risk Management or Governance Risk and Compliance platform
    • Creating strategies for sustained growth in 2020 and beyond

    Find out what you need to know to manage audit risk in 2020 and beyond by attending this educational webinar. Register now!
  • Improve Your PCI DSS Management Effectiveness
    Improve Your PCI DSS Management Effectiveness
    Sam Abadir, Lockpath Recorded: May 15 2019 42 mins
    Payment Card Industry Data Security Standard (PCI DSS) pushes organizations to achieve six distinct goals in the aim of protecting payment systems from breaches and theft of cardholder data. The requirements supporting the goals force organizations to manage, govern and integrate different departments within the business including IT, security, compliance, risk, incident response, and policy management.

    Those managing this effort quickly realize that the effort to achieve the goals effectively and in a timely manner requires PCI DSS to be a day-to-day part of your business executed with purposeful coordination and immediate access to information to continuously assess the PCI DSS environment, remediate vulnerabilities and report required information.

    In this live webinar, Lockpath’s Sam Abadir will share what a PCI DSS solution looks like, including:

    • Best practices for effectively managing PCI DSS
    • How your organization can gain efficiency from proper a PCI DSS solution
    • Maintaining a strong vulnerability management program with PCI DSS
    • Advantages of managing PCI DSS solutions efforts on a Governance, Risk and Compliance or Integrated Risk Management platform

    Find out what you need to know to better manage your PCI DSS solution by attending this educational webinar. Register now!
  • Why data quality is integral to Pensions Dashboard success
    Why data quality is integral to Pensions Dashboard success
    Experian's: Mike Sheridan, Client Director, Wealth, Life & Pensions, and Mark Pearce, Strategic Business Development Director Recorded: May 15 2019 33 mins
    The introduction of the Pensions Dashboard presents a transformative opportunity for the pensions industry, driving greater public engagement and boosting long-term savings.



    To ensure success, it’s vital that from the outset users can easily validate themselves and only the correct data is shown to the correct person. Inaccurate data going into the dashboard will result in a poor outcome for customers, potential penalties for the providers, and customers will be unlikely to return to the dashboard as a result.



    Experian’s work with Pension Providers has shown data quality to be challenge for the industry. It’s essential Pension Providers tackle this challenge and focus on improving the quality of their customer data for the dashboard to be a success, and providers to reap the benefits.



    Join this webinar to hear from Experian pension specialists as they discuss:

    · Key takeaways from the DWP’s Feasibility Report

    · Data challenges facing pension organisations

    · Why data quality is key to Pension Dashboard success

    · What steps you can take to begin to address your data quality challenges
  • Transatlantic derivatives: The current state of play
    Transatlantic derivatives: The current state of play
    IFLR, Jeremy Jennings Mares, James Schwartz, Morrison & Foerster Recorded: May 14 2019 76 mins
    This webinar will provide an update on derivatives regulatory developments in the EU and the US, addressing the implications of Brexit for derivatives, as well as recent developments relating to the CFTC’s regulations for swaps and the SEC’s regulations for security-based swaps.

    Additional topics to be discussed include:
    •The upcoming EMIR II regulation
    •The impact of the EU’s financial Benchmarks Regulation
    •The initial margin “Big Bang”

    Time: 11am - 12pm EDT / 4pm - 5pm BST
  • Live Demo: AppZen - AI Powered Expense Audit Platform
    Live Demo: AppZen - AI Powered Expense Audit Platform
    Chris Hester Recorded: May 8 2019 47 mins
    Chris Hester, Solutions Architect at AppZen, gives a high-level overview of how AppZen audits every dollar of company spend and showcases the capabilities and key features of our Expense Audit Platform.

    Attend this webinar to learn how to
    -Reach 100% audit spend
    -Proactively enforce policy
    -Get employees paid faster
  • Re:Call benefits explainer
    Re:Call benefits explainer
    Mark Elwood Recorded: May 8 2019 1 min
    A short video to explain the benefits Re:Call can bring to your organisation.
  • IoT / OT and the Death Star Part 2
    IoT / OT and the Death Star Part 2
    Donald E Hester & Robert DeRoeck Recorded: May 6 2019 71 mins
    In the iconic Science Fiction classic Star Wars a New Hope the mightily Death Star was destroyed by the rebels exploiting the vulnerability of a small thermal vent. Similarly, the massive Target data breach was made possible by a remote maintenance connection to their cooling system. Internet of Things (IoT) and Operational Technology (OT) devices have positive impacts on organization efficiency however, they are often overlooked when performing risk and vulnerability assessments. Security systems, environmental controls, automation, SCADA, plant technology, robots, and artificial intelligence all have vulnerabilities. In this session we will explore some of the risks related to IoT & OT and what can be done to mitigate the risks.

    Coverage
    NIST CSF, NIST SP 800-53, PCI DSS, COBIT, ISO 27001, ISA 62443, COSO, AWWA G430-14
    IT, OT, IoT, Cloud, AI
  • SkyStem: Perfecting the Close Checklist
    SkyStem: Perfecting the Close Checklist
    Nancy Wu, Sales and Customer Support, SkyStem Recorded: May 2 2019 55 mins
    [Live Recording] It's time to spruce up the close checklist! Join us in this webinar where we will revisit best practices as well as practical tips to help improve the financial close process. Whether you have a close checklist, a close calendar, or even if you are still forming a close process, these practices will surely help your period-end close.

    Please note: CPE credit not available for this playback
  • Open Source Risk in M&A by the Numbers
    Open Source Risk in M&A by the Numbers
    Phil Odence, General Manager, Black Duck On-Demand Recorded: May 2 2019 51 mins
    In over 1,000 codebases audited in 2018, Black Duck Audits found that nearly every one contained open source components. Not only that, but a significant percentage of “proprietary code” overall was open source. Virtually every company building software now depends on open source, and with great reason. However, left unmanaged, open source can lead to license compliance issues plus security and code quality risks. Whether you’re on the buy side or sell side, these risks could negatively affect valuation in an M&A transaction.

    Many acquirers have come to understand all this in concept; the Black Duck audit services group has the data. Join us for this webinar as we answer questions about the code of tech companies being acquired today. We’ll cover:

    • Open source license and security risks by the numbers
    • Why audits have become the norm in M&A tech due diligence
    • How you can get a complete picture of open source risks

    Don’t miss this informational webinar – register today.
  • You're Vulnerable because Patch Management is Broken
    You're Vulnerable because Patch Management is Broken
    Gary Paquette General Manager, Technology Asset Management Nlyte Software Recorded: May 2 2019 29 mins
    Learn how Nlyte for Microsoft SCCM ensures delivery and installation to bolster patch security

    - Validate SCCM agent is installed, configured, and operational
    - Query platforms not accessible by SCCM
    - Reconcile systems to correct cost centers and departments
    - Eliminate False positives

    Nlyte Asset Explorer uses agentless technology to scan your network from desktop to data center to cloud, creating an inventory of your hardware, software and networking assets. It supports all major protocols, integrates with your CMDB and creates a single source of knowledge of 100’s of data points.

    We look forward to seeing you there.
  • CIAM und API-Management - Eine symbiotische Beziehung
    CIAM und API-Management - Eine symbiotische Beziehung
    Andre Priebe, CTO, iC Consult Group May 27 2019 1:00 pm UTC 60 mins
    Kunden Identity und Access Management und API-Management - Eine symbiotische Beziehung

    Customer Identity & Access Management und API Management sind als Business Enabler bekannt. Aber in Kombination sind sie sogar mehr als die Summe ihrer Teile.

    Erfahren Sie, wie digitale Identitäten Ihrer Kunden und Ihrer APIs das digitale Ökosystem Ihrer Kunden infiltrieren, um sie noch stärker an Ihr Unternehmen zu binden. Verstehen Sie, warum die Weitergabe von Kontrolle an Dritte und externe Entwickler der Schlüssel zum Erfolg dieses Ansatzes ist und dass die Einhaltung von Standards Voraussetzung dafür ist.

    Die zentralen Thesen:

    · API-Management ist die Schlüsseltechnologie, um Teil des digitalen Ökosystems Ihrer Kunden zu werden

    · Wichtigste Akteure einer API-Management-Lösung sind externe Entwickler

    · Customer Identity & Access Management und API Management beschleunigen sich gegenseitig
  • CIAM and API Management  - A symbiotic relationship
    CIAM and API Management - A symbiotic relationship
    Andre Priebe, CTO, iC Consult Group May 28 2019 2:00 pm UTC 60 mins
    Customer Identity & Access Management and API Management - A symbiotic relationship

    Customer Identity & Access Management and API Management are known as business enablers. But, in combination, they are even more than the sum of their parts.

    Learn how the digital identities of your customers and your APIs infiltrate your customers’ digital ecosystems to further engage them with your business. Understand why sharing control with third parties and external developers is essential to this approach, and why compliance with standards is a prerequisite.

    Core theses:

    - API Management is the key technology allowing you to become part of your customers’ digital ecosystems
    - External developers are the key players in an API Management solution
    - Customer Identity & Access Management and API Management accelerate each other
  • SkyStem: From Caterpillar to Butterfly
    SkyStem: From Caterpillar to Butterfly
    Nancy Wu, Sales and Customer Support, SkyStem May 28 2019 6:00 pm UTC 58 mins
    [Live Recording] Metamorphosis describes the process of transformation from a child form to a mature form in two or more distinct stages. Within your organization, some of the key finance processes have worked the same way for decades, and could probably benefit from a transformation of sorts. Join us in this webinar where we explore common technologies that can be easy incorporated into your current processes to modernize the traditional workplace. We'll cover everything from time and expense reporting, to accounts payable, to budgeting as well as financial close automation.

    Please note: CPE credit not available for this playback
  • Uptime Institute 2019 Data Center Industry Survey Results
    Uptime Institute 2019 Data Center Industry Survey Results
    Andy Lawrence - Executive Director of Research, Rhonda Ascierto - VP of Research, Christopher Brown - Chief Technical Officer May 29 2019 4:00 pm UTC 60 mins
    The data center industry’s largest and most influential survey results are in. Join us May 29th at 9:00 AM Pacific time to see what’s trending. Are data centers getting more efficient? How are outages changing? What proportion of workloads are running in the cloud? Will rack density rise at last?
  • Keeping Production from Becoming a Big Production
    Keeping Production from Becoming a Big Production
    Doug Austin and Tom O'Connor May 29 2019 5:00 pm UTC 75 mins
    Does it seem like eDiscovery production always seems to be such a big production? It doesn’t have to be. There are a number of steps you can take to minimize the stress, cost and rework associated with producing electronically stored information to opposing counsel as well as to ensure that their production to you is as useful as possible. This CLE-approved* webcast will discuss some of the most common steps you can take during the discovery life cycle to keep your eDiscovery production on track. Topics include:

    + When to Start Thinking About the Production
    + Proactively Addressing Inadvertent Privilege Productions
    + Up Front Planning to Reduce Your Production Burden
    + Avoiding Getting Stuck with a Bad Production from Opposing Counsel
    + Understanding Your Data to Drive Discovery Decisions
    + Minimizing Potential ESI Spoliation Opportunities
    + Eliminating Processing Mistakes that Can Slow You Down
    + Common Searching Mistakes and How to Avoid Them
    + Avoiding the Redaction "Epic Fail"
    + Understanding Load Files and Common Issues with Them
    + Ensuring a Smooth and Accurate Production Set

    Presentation Leaders:

    Doug Austin is the Vice President of Products and Services for CloudNine. Doug has over 30 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients. Doug is also the editor of the CloudNine sponsored eDiscovery Daily blog, which is a trusted resource for eDiscovery news and analysis, and has received a JD Supra Readers Choice Award as the Top eDiscovery Author each year since 2017.

    Tom O’Connor is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems. Tom’s consulting experience is primarily in complex litigation matters.
  • Next Generation Discovery for ServiceNow
    Next Generation Discovery for ServiceNow
    Mark Gaydos, CMO, at Nlyte Software May 30 2019 8:00 am UTC 20 mins
    Shouldn’t your CMDB be Your Trusted Source of Truth? Is it really?

    In this webinar you will learn:

    - How Next Generation Discovery improves your ServiceNow CMDB data accuracy
    - How you can cost effectively automate the discovery and reconciliation across your entire compute infrastructure
    - How to increase efficiency by up to 20%
    - Find assets you weren’t aware were on your network
    - Significantly reduces the time it takes you to perform audits

    Join this webinar where Mark Gaydos, CMO of Nlyte Software, will present the Next Generation Discovery - It is about what you don't know.
  • Next Generation Discovery for ServiceNow
    Next Generation Discovery for ServiceNow
    Mark Gaydos, CMO, at Nlyte Software May 30 2019 4:00 pm UTC 20 mins
    Shouldn’t your CMDB be Your Trusted Source of Truth? Is it really?

    In this webinar you will learn:

    - How Next Generation Discovery improves your ServiceNow CMDB data accuracy
    - How you can cost effectively automate the discovery and reconciliation across your entire compute infrastructure
    - How to increase efficiency by up to 20%
    - Find assets you weren’t aware were on your network
    - Significantly reduces the time it takes you to perform audits

    Join this webinar where Mark Gaydos, CMO of Nlyte Software, will present the Next Generation Discovery - It is about what you don't know.
  • Delivering Digital Client Onboarding For Better Client Experience
    Delivering Digital Client Onboarding For Better Client Experience
    Conor Coughlan, James Follette, Rachel Woolley, Jonathan Jones, Philippe Guiral May 31 2019 7:00 am UTC 61 mins
    In this webinar, Fenergo and Accenture join forces to present a target operating model for how commercial and business banks can design their digital client journeys from end-to-end to deliver a better client experience throughout initial client onboarding and throughout the entire client lifecycle.

    In this webinar, you'll learn:

    - The top trends in digital transformation and client experience
    - Expected regulatory changes in 2019/2020 impacting Client Lifecycle Management
    - Target Operating Model: How to design and implement a frictionless, straight through
    client journey from initial onboarding to ongoing lifecycle management, including the
    key digital technologies that will make this happen e.g. eSignatures, digital ID&V,
    biometrics etc.
    - Live Demo: What a digital, well-orchestrated and connected Client Onboarding &
    Lifecycle process looks like
  • Chop Suey mit Pommes - CIAM von Amerika bis China
    Chop Suey mit Pommes - CIAM von Amerika bis China
    Dr. Heiko Klarl, CMO, iC Consult Group und Dietmar Kenzle, RSD DACH & EE, Ping Identity Jun 3 2019 2:00 pm UTC 60 mins
    Die digitale Transformation, weltweite neue digitale Geschäftsmodelle und technologische Trends wie künstliche Intelligenz werden die Kundenbeziehungen revolutionieren. Es wird unabdingbar, die Kommunikation mit dem Kunden weltweit zu personalisieren und ihn stets im richtigen Kontext anzusprechen. Basis dafür ist ein integriertes Kundendatenmanagement, das neue Vertriebspotenziale erschließt und das Kundenerlebnis verbessert.

    In diesem Webinar erfahren Sie:
    Mehr über die strategischen Herausforderungen, die mit der Einführung von Customer Data Management-Lösungen einhergehen, und wie diese angegangen werden können: Von Time-to-Market-Anforderungen über den internationalen Rollout von Amerika bis China bis hin zur Unterstützung neuer Services bei Fusionen & Übernahmen.
  • Das Geheimnis erfolgreicher Unternehmen. Wie man Daten richtig nutzt.
    Das Geheimnis erfolgreicher Unternehmen. Wie man Daten richtig nutzt.
    Oliver Sehon (Director Analytics Integation, SAP) und Jochen Alig (Solution Consultant Senior, SAP Concur) Jun 4 2019 2:00 pm UTC 41 mins
    Nur wer seine (Geschäftsreise-)Daten kennt, kann sie erfolgreich einsetzen. Erleben Sie anhand des Digital Boardrooms, welche Möglichkeiten die Integration von SAP Concur in die SAP Analytics Cloud bringt.

    Daten aus dem Geschäftsreisemanagement berühren viele Abteilungen:

    - Finanzverantwortliche, die sich volle Transparenz über Kosten und eine verlässliche Datengrundlage für Investitionsentscheidungen wünschen.

    - Travel Manager, die wissen wollen, wie Mitarbeiter reisen, um in Verhandlungen mit Anbietern das Maximum herauszuholen.

    - HR-Experten, für die es wichtig ist, die (Reise-)Gewohnheiten Ihrer Mitarbeiter zu kennen, um so in der Lage zu sein, deren Zufriedenheit zu erhöhen.
  • Five ways the G2000 is Building Security and Trust
    Five ways the G2000 is Building Security and Trust
    Ravi Das, Cyber Security News and Ann-Marie (Punky) Witt, Synack Jun 4 2019 5:00 pm UTC 29 mins
    We asked CISOs from the Global 2000, government agencies, and high-growth companies about their 2019 priorities. Across the board, they answered: effective, efficient security that is grounded in trust.

    In this new webinar Cyber Security News’ Ravi Das dives deep into the 2019 Trust Report findings with Synack’s Director of Product Marketing, Anne-Marie (Punky) Witt. In this webinar, Ravi and Punky discuss the key findings from the report, including:
    - The 2019 list of most secure and trusted industries
    - Average security performance over time (and the impact on trust scores)
    - The ROI of a continuous, integrated approach to security
    - Trends in severity of vulnerability findings and remediation
    - The 5 things that successful organizations are doing to build security and trust
  • Reisekostenmanagement im intelligenten Unternehmen
    Reisekostenmanagement im intelligenten Unternehmen
    Jens Schneider (Director Product Marketing, SAP Concur), Benjamin Tattermusch (Regional Sales Executive, SAP Concur) Jun 5 2019 2:00 pm UTC 22 mins
    Von der Vision eines integrierten Ausgabenmanagements zur gelebten Plattform mit einem digitalen Ökosystem: Erleben Sie die Vorteile einer Ausgabenmanagement-Lösung in einem intelligenten Unternehmen. Erfahren Sie, wie Sie Silos zwischen Ihrer Finanz-, IT- und Einkaufsabteilung beseitigen und Ihre Prozesse optimieren können. Verschaffen Sie sich noch mehr Kontrolle über Ihre Ausgaben.

    Sie wollen zu Travel & Expense Management auf dem Laufenden bleiben? Dann registrieren Sie sich jetzt für den News-Service von SAP Concur: https://bit.ly/2GZRZba
  • You're Vulnerable because Patch Management is Broken
    You're Vulnerable because Patch Management is Broken
    Gary Paquette General Manager, Technology Asset Management Nlyte Software Jun 6 2019 8:00 am UTC 28 mins
    Learn how Nlyte for Microsoft SCCM ensures delivery and installation to bolster patch security

    - Validate SCCM agent is installed, configured, and operational
    - Query platforms not accessible by SCCM
    - Reconcile systems to correct cost centers and departments
    - Eliminate False positives

    Nlyte Asset Explorer uses agentless technology to scan your network from desktop to data center to cloud, creating an inventory of your hardware, software and networking assets. It supports all major protocols, integrates with your CMDB and creates a single source of knowledge of 100’s of data points.

    We look forward to seeing you there.
  • Vulnerabilities in Containerised Production Environments
    Vulnerabilities in Containerised Production Environments
    Tim Mackey, Senior Technical Evangelist, Synopsys Jun 6 2019 9:00 am UTC 90 mins
    With each new technology cycle, we seek to improve both business efficiency and security. Unfortunately, our legacy practices can severely hold us back from achieving the full potential of our new technology stack. When this occurs, organisations with the most valuable data come under attack first.
  • SAP Travel Management On-Premise und SAP Concur – Teil 1
    SAP Travel Management On-Premise und SAP Concur – Teil 1
    Pia Lübeck (Director, Global SAP Concur CoE, SAP SE), Jochen Neubauer (Customer Value Sales, SAP Concur) Jun 6 2019 2:00 pm UTC 55 mins
    Die Geschäftsreisemanagement-Tools SAP Travel Management On-Premise und SAP Concur: Was unterscheidet sie? Welches ist heute und in Zukunft die beste Lösung für Ihr Unternehmen? Und was kommt bei einem Wechsel von der On-Premise Lösung in die Cloud auf Sie zu? In diesem Teil 1 der Serie "Strategie und Funktionen" geht es um:

    - Die Rolle der Lösungen in SAPs Intelligent Enterprise Strategie
    - SAP Concur und die Rolle innerhalb des SAP-Portfolios
    - Wesentliche Unterschiede beider Lösungen & Vorteile eines Wechsels

    Im zweiten Teil geht es um die technischeren Aspekten eines Wechsels: Ansätze zur Implementierung und Wartung beider Lösungen sowie der aktuelle Stand der Integration von SAP Concur in andere SAP Systeme.

    Sie wollen zu Travel & Expense Management auf dem Laufenden bleiben? Dann registrieren Sie sich jetzt für den News-Service von SAP Concur: https://bit.ly/2GZRZba
  • You're Vulnerable because Patch Management is Broken
    You're Vulnerable because Patch Management is Broken
    Gary Paquette General Manager, Technology Asset Management Nlyte Software Jun 6 2019 4:00 pm UTC 28 mins
    Learn how Nlyte for Microsoft SCCM ensures delivery and installation to bolster patch security

    - Validate SCCM agent is installed, configured, and operational
    - Query platforms not accessible by SCCM
    - Reconcile systems to correct cost centers and departments
    - Eliminate False positives

    Nlyte Asset Explorer uses agentless technology to scan your network from desktop to data center to cloud, creating an inventory of your hardware, software and networking assets. It supports all major protocols, integrates with your CMDB and creates a single source of knowledge of 100’s of data points.

    We look forward to seeing you there.
  • Invoice Audit with AI: 15 1/2 Real World Use Cases
    Invoice Audit with AI: 15 1/2 Real World Use Cases
    David Wishinsky, Sr. Product Marketing Manager, AppZen Jun 6 2019 6:00 pm UTC 43 mins
    Invoicing and payments problems can take a variety of forms: fraudulent invoices, invoices that don't represent negotiated terms, or just plain duplicates.

    As your business grows and your vendor list gets larger, how do you stay on top of the validity of each invoice?

    Join David Wishinsky, Sr. Product Marketing Manager at AppZen, as he reveals 15 critical invoice audit and contract compliance use cases that AI makes possible.

    Register to learn how AI can help you to
    - Reduce spend by proactively finding invoice errors and fraud
    - Comply with regulations
    - Stay ahead of auto-renewals and early discount opportunities
  • SAP Travel Management On-Premise und SAP Concur – Teil 2
    SAP Travel Management On-Premise und SAP Concur – Teil 2
    Pia Lübeck & Isabelle Paul (SAP SE), Manu Kozhuppankutty (SAP Concur) Jun 7 2019 8:00 am UTC 51 mins
    Die Geschäftsreisemanagement-Tools SAP Travel Management On-Premise und SAP Concur: Was unterscheidet sie? Welches ist heute und in Zukunft die beste Lösung für Ihr Unternehmen? Und was kommt bei einem Wechsel von der On-Premise Lösung in die Cloud auf Sie zu? In diesem Webinar geht es um:

    - Unterschiede in der Implementierung
    - Unterschiede in der Wartung und Anpassungen im laufenden Betrieb
    - Integration von SAP Concur in andere SAP Systeme

    Sie wollen zu Travel & Expense Management auf dem Laufenden bleiben? Dann registrieren Sie sich jetzt für den News-Service von SAP Concur: https://bit.ly/2GZRZba
  • The State of Alternative Credit Data
    The State of Alternative Credit Data
    Kevin King, Head of Product Marketing at ID Analytics and Leslie Parrish, Senior Research Analyst at Aite Jun 11 2019 6:00 pm UTC 60 mins
    Over the past few years alternative data has emerged as a critical best practice for card issuers – offering a more complete picture of consumer creditworthiness, and with that an opportunity to fine tune competitive lending strategies. But keeping track of best practices in such a rapidly evolving space is no easy task.

    This presentation will provide an update on the world of alternative credit data, shedding new light on its ability to assess credit invisibles, its application in prescreen and portfolio management use cases, and clarifying the pros and cons of contributed vs. permissioned alternative data solutions. By providing a current snapshot of the opportunities and landmines, this presentation will deliver an essential perspective to help lenders demystify the world of alternative data in 2019.
  • Die Vorteile einer integrierten Reisekostenplattform
    Die Vorteile einer integrierten Reisekostenplattform
    Andreas Klein (Director Solution Consulting, SAP Concur), Benjamin Tattermusch (Regional Sales Executive, SAP Concur) Jun 12 2019 2:00 pm UTC 32 mins
    Erhalten Sie in diesem Webinar Einblicke in die Welt von SAP Concur. Erfahren Sie von Andreas Klein (Director Solution Consulting) und Benjamin Tattermusch (Regional Sales Executive) die Vorteile des End2End-Prozesses in Kombination mit einer integrierten Reisekostenplattform und dem SAP Concur Partner-Ecosystem.

    Sie wollen zu Travel & Expense Management auf dem Laufenden bleiben? Dann registrieren Sie sich jetzt für den News-Service von SAP Concur: https://bit.ly/2GZRZba
  • Ensure Organizational Compliance with CCPA
    Ensure Organizational Compliance with CCPA
    Sam Abadir, Lockpath Jun 12 2019 4:00 pm UTC 60 mins
    The California Consumer Privacy Act (CCPA) is the first major U.S. privacy law to unfold. This law has interested other states in following suit, which may soon call for a national U.S. Privacy Law. Organizations are uncertain how to comply with CCPA, which takes effect January 1, 2020.

    In this live webinar, Lockpath’s Sam Abadir will share what preparation for CCPA compliance entails, including:

    • Protecting consumer data
    • Applying technology to processes
    • Managing multiple channels for consumers exercising their rights
    • Ensuring a fast response to breaches
    • Requirements of CCPA
    • Strategic approach to CCPA
    • Best practices for managing CCPA
    • Best practices for responding to privacy incidents

    As an attendee you’ll learn how to approach CCPA to prepare yourself for the new law in 2020 and set the foundation for other privacy laws as they impact your organization. Register now!
  • The State of E-Discovery 2019
    The State of E-Discovery 2019
    EDRM and Exterro Jun 12 2019 5:00 pm UTC 60 mins
    E-Discovery continues to emerge as a growing influence in the legal world. Beyond just litigation, e-discovery considerations are playing a tremendous role in regulatory and compliance activities with the new and soon to enacted legislation (e.g. California Consumer Privacy Act, GDPR).
    In for this upcoming webcast, take a comprehensive look back at the last year in e-discovery and learn best practices for managing e-discovery processes in an effective and efficient manner throughout your legal department.
    Register now for this webcast and learn:
    - E-Discovery spend trends and how legal teams are trying to manage e-discovery spend
    - How legal departments are trying to be more efficient and improve their processes
    - How to maintain e-discovery defensibility in a converging legal world between litigation, compliance and regulatory areas of practice

    Speakers:
    Deana Uhl, Senior Director, FTI Technology
    Nishad Shevde, Managing Director - Client Operations, Exterro
    Mike Hamilton, Director of Marketing, Exterro
  • Mobile Apps und Single Sign-On
    Mobile Apps und Single Sign-On
    Andre Priebe, CTO, iC Consult Group Jun 13 2019 1:00 pm UTC 60 mins
    Wenn es um die Integration von Mobile Apps in die Single Sign-On-Umgebung geht, dann entstehen oft Interessenskonflikte zwischen Designern, der IT-Sicherheit und dem, was der Kunde wirklich möchte.

    Welchen Einfluss hat das gewählte Login-Verfahren auf die Sicherheit und welche Ansätze haben sich in der Praxis bewährt? Wie kann ein Kompromiss aussehen, der sowohl den Kunden zufriedenstellt, aber trotzdem ein ausreichendes Sicherheitsniveau bietet? Erfahren Sie, welche Best Practices es gibt und welche Rolle OAuth 2.0 dabei spielt.

    Interessenskonflikt – Designer, Endkunde und die IT-Sicherheit
    Einfluss der Login-Methodik auf die Benutzerzufriedenheit
    Sicherheitsbetrachtung
    Best-Practices, Vorgehensweisen und Empfehlungen
    OAuth 2.0 als Lösungsoption
  • Mobile Apps and Single Sign-On
    Mobile Apps and Single Sign-On
    Andre Priebe, CTO, iC Consult Group Jun 14 2019 2:00 pm UTC 60 mins
    When it comes to integrating mobile apps into the single sign-on environment, conflicts of interest often arise between designers, IT security, and what the customer really wants.

    What influence does the chosen login procedure have on security, and which approaches have proven themselves in practice? What compromise could satisfy the customer and still offer a sufficient level of security? Discover current best practices and find out what role OAuth 2.0 plays in them.

    1. Conflict of interest – designer, end customer, and IT security
    2. Influence of login method on user satisfaction
    3. Security assessment
    4. Best practices, procedures, and recommendations
    5. OAuth 2.0 as a possible solution
  • Mehrwertsteuer-Rückerstattung leicht gemacht - Mit SAP Concur & seinen Partnern
    Mehrwertsteuer-Rückerstattung leicht gemacht - Mit SAP Concur & seinen Partnern
    Benjamin Tattermusch (Regional Sales Executive, SAP Concur) Jun 19 2019 2:00 pm UTC 35 mins
    SAP Concur App-Center Partner VATBox und Kunde Lonza zeigen, welche Vorteile die Integration von VATBox und SAP Concur hat und wie effektiv die Mehrwertsteuer-Rückerstattung von Geschäftsreisen damit ist.

    Sie wollen zu Travel & Expense Management auf dem Laufenden bleiben? Dann registrieren Sie sich jetzt für den News-Service von SAP Concur: https://bit.ly/2GZRZba