Hi [[ session.user.profile.firstName ]]

Audit and Compliance

  • Ensuring Healthcare Privacy and Access While Managing Multiple Technologies
    Ensuring Healthcare Privacy and Access While Managing Multiple Technologies Cook Children’s Health Care System; Texas Hospital Association; DocuSign Recorded: Feb 20 2018 62 mins
    From admission and discharge to billing and record keeping, today’s hospitals use technology along every point of the care continuum. But challenges remain, especially when so many clinicians and staff access patient records across multiple points, and often on different equipment.

    Health IT leaders must safeguard patient data not only on desktop computers, but on hand-held devices, remote monitoring equipment, patient and physician portals, and more.

    Watch this webinar and learn how to:

    - Use multiple technologies to boost physician access
    - Implement new processes to speed up patient experiences
    - Ensure data security across every device and equipment
  • Achieving Compliance Agility with a Harmonized Controls Framework
    Achieving Compliance Agility with a Harmonized Controls Framework Lynn Heiberger - Unified Compliance; Sam Abadir - Lockpath Recorded: Feb 15 2018 60 mins
    In our uncertain regulatory climate, it’s essential for compliance to remain flexible. One way to achieve this is by implementing a harmonized controls framework. In this webinar, Lockpath and Unified Compliance will explore the growing need for harmonized controls and how this type of controls framework can bring agility to compliance--a necessity in a time of regulatory uncertainty.

    Attendees will learn:
    • The concept and reasons for using a single controls framework
    • How one organization quickly addressed updated regulatory guidance using a harmonized controls framework
    • How to achieve compliance agility with harmonized controls and an integrated risk management platform
  • Training Snapshot: Persistent Highlighting from CloudNine
    Training Snapshot: Persistent Highlighting from CloudNine Brian Kelley Recorded: Feb 15 2018 3 mins
    A snapshot demonstration of the process required to set up and view persistent highlight terms within CloudNine to ensure important terms are always highlighted during review, regardless of search criteria.

    Failing to spot highly relevant, hot or privilege terms during document review can lead to important documents being missed or inadvertent disclosure of privileged information. Persistent highlighting enables these important terms to be always highlighted – regardless of search criteria – enabling them to be more easily spotted during review, which improves the quality of the review process.

    Training Snapshot Presenter: Brian Kelley

    Brian is the Director of Customer Success for CloudNine. At CloudNine, Brian manages training, support and customer success efforts for CloudNine's Software-as-a-Service (SaaS) eDiscovery clients. Brian has extensive experience providing legal technology consulting and technical support services to numerous commercial and government clients ranging from multinationals corporations and large law firms to litigation support providers and governmental agencies.
  • Kill Excel: Better Compliance Efficiency Through Regtech
    Kill Excel: Better Compliance Efficiency Through Regtech Neal Reiter - Head of Product, IdentityMind; Jana Luz Alonso - CORE, IdentityMind Recorded: Feb 13 2018 40 mins
    Spreadsheets are a popular tool for compliance officers in the financial industry. They're quick to set up and easily customizable. But as businesses grow and come under mounting regulatory oversight, tools like Excel rapidly fall behind in functionality, putting the business at risk of non-compliance the longer they're around.

    IdentityMind's AML solution processes transactions and monitors them against regulatory rules in real time. This automated solution is scalable, making it affordable for small and large companies alike.

    Join this webinar to learn how a Regtech solution:
    • Improves compliance operations by providing a clear overview in one system
    • Streamlines exams with automated case management and reporting functionalities
    • Allows the application of a risk-based strategy, detecting suspicious activity more accurately
  • 2018 Trends in Information Security
    2018 Trends in Information Security Scott Crawford, Research Director, Information Security and Dan Kennedy, Research Director, Voice of the Enterprise Recorded: Feb 13 2018 66 mins
    In 2018, the gains realized from applied analytics will become so pervasive that we expect virtually every security product to be an analytics product. Automation will become more evident, identity will assume new importance, and consolidation will be the word of the day at the endpoint. With new classes of security concerns already making headlines in 2018 – and with EU Global Data Protection Regulation and privacy in the spotlight - what risks are on the horizon?

    Join Scott Crawford, Research Director, Information Security and Dan Kennedy, Research Director, Voice of the Enterprise, for a live webinar on February 13 as he reviews these and other trends expected to shape the information security landscape in 2018, and the level of impact those trends will have on the market. Come armed with questions, as there will be a live Q&A session at the end of the webinar.
  • Guidance for Third Parties in Business Continuity Plans
    Guidance for Third Parties in Business Continuity Plans Tom Garrubba - Shared Assessments; Sam Abadir - Lockpath Recorded: Feb 13 2018 54 mins
    Vendors and third parties are extensions of an organization and thus, business continuity and third-party risk management are intertwined. Companies of all sizes need to ensure their essential business functions remain available during disruptive events, especially when those functions depend on vendors and third parties. Furthermore, an organization’s business continuity plan must include scenarios when crisis events may impact its ability to exchange information or provide services to third parties.

    In this 60 minute webinar, Tom Garrubba, Senior Director, Shared Assessments, and LockPath’s Sam Abadir provide an overview of why vendors pose a business continuity risk. The session will include strategies and best practices for including vendors in business continuity plans and questions organizations should be asking third parties to prepare their BC plans.
  • Vendor Risk Management with the Lockpath Keylight Platform
    Vendor Risk Management with the Lockpath Keylight Platform Lockpath Recorded: Feb 9 2018 2 mins
    Keylight from Lockpath empowers you to manage the entire third-party lifecycle in one platform.
  • Training Snapshot: Filtering Your Document Collection from CloudNine
    Training Snapshot: Filtering Your Document Collection from CloudNine Brian Kelley Recorded: Feb 8 2018 5 mins
    A snapshot demonstration of the process required to filter your document collection within CloudNine to exclude documents from search and view.

    Duplicate and non-responsive ESI can comprise a significant portion of your document collection. Filtering your document collection to exclude duplicative and clearly non-responsive ESI enables you to reduce costs by eliminating redundant and non-responsive files from the review population and focus more on ESI that is unique and potentially responsive to the matter.

    Training Snapshot Presenter: Brian Kelley

    Brian is the Director of Customer Success for CloudNine. At CloudNine, Brian manages training, support and customer success efforts for CloudNine's Software-as-a-Service (SaaS) eDiscovery clients. Brian has extensive experience providing legal technology consulting and technical support services to numerous commercial and government clients ranging from multinationals corporations and large law firms to litigation support providers and governmental agencies.
  • OCC Bulletin: Risk Management Principles
    OCC Bulletin: Risk Management Principles Sam Abadir - Lockpath Recorded: Feb 8 2018 38 mins
    Introducing new products and services or modifying existing ones is the lifeblood of any bank. That said, a recent OCC Bulletin conveys a related urgency. Products and services should not just follow plans and strategies but also utilize sound risk management principles. In this webinar, we’ll dive into those principles and the implications of the bulletin.

    As an attendee, you’ll learn:
    • Overview and ramifications of OCC Bulletin 2017-43
    • Risk management principles applicable to bank products and services
    • Key themes and trends related to banking innovation and customer preferences
    • Challenges banks face in addressing key themes/trends
    • How GRC technology supports a bank’s integrated risk management program

    2018 will be a banner year for banks to introduce new or updated products and services. How well you manage risk, be it strategic, reputational, credit, liquidity, operational, or compliance, will greatly determine the degree of success. Learn to manage bank risk in this webinar.

    Register now.
  • Transformando la experiencia del cliente para un mundo omnicanal
    Transformando la experiencia del cliente para un mundo omnicanal Marco de Vries, CEO at Openbravo Recorded: Feb 6 2018 56 mins
    En una era omnicanal, las experiencias son más complejas, mejor informadas y más fragmentadas, aún así, muchos minoristas con tiendas físicas no han adaptado sus estrategias a esta realidad. Para competir con las tiendas puramente online, los minoristas deben crear experiencias más personalizadas y enriquecedoras que incrementen el compromiso y la fidelidad del cliente para que estos deseen volver a sus tiendas.

    ¿Qué aprenderá?

    Explicamos dónde debe enfocar sus inversiones en tecnología para lograr excelencia omnicanal, mediante una mejor planificación de la demanda y gestión de inventario, por ejemplo.

    Mostramos cómo utilizar la tecnología para transformar la relación con sus clientes mediante estrategias de personalización.

    Vemos algunos de los métodos con lo que los minoristas están transformando sus tiendas en destinos experimentales de compra que complementan en lugar de competir con puntos de contacto digitales.
  • Transforming the store and customer experience for an omnichannel world
    Transforming the store and customer experience for an omnichannel world Marco de Vries, Chief Executive Officer, Openbravo Recorded: Feb 6 2018 43 mins
    In an omnichannel era, shopping journeys are more complex, better informed and more fragmented, yet many physical retailers have not adapted their strategies reflect to this new reality. To compete against online pure-plays, retailers need to create richer, more personalized experiences that increase engagement with the customer and make them want to come back to their stores

    What you will learn?

    We explain where to focus your technology investments to achieve omnichannel excellence, through better demand planning and inventory management, for example.

    We show how to use technology to transform the relationship with your customers through better personalization strategies.

    We look at some of the ways retailers are transforming their stores into experiential shopping destinations that complement rather than compete with digital touchpoints.
  • Heartland Payment Systems and Business Continuity with the Keylight Platform
    Heartland Payment Systems and Business Continuity with the Keylight Platform Ken Voiles - Heartland; Sam Abadir - Lockpath Recorded: Feb 5 2018 52 mins
    In 2014, Heartland Payment Systems discovered through a survey of its entire management team that one of its top two risks was business continuity. Addressing this issue was no small task. As one of the nation’s largest payment processors, Heartland employs more than 5,000 people in more than 50 facilities across the U.S., all of which required business continuity plans.

    In this webinar, Ken Voiles, senior business continuity analyst at Heartland, along with Sam Abadir, LockPath’s director of product management, will explain the steps Heartland took to develop BC plans in its U.S. operations. They will also highlight how the company used the Keylight Platform to minimize the risk of disruptive events on its business, and how the platform’s scalability will enable the company to expand the initiative to its global operations.
  • Business Continuity Management with the Lockpath Keylight Platform
    Business Continuity Management with the Lockpath Keylight Platform Lockpath Recorded: Feb 5 2018 2 mins
    Create detailed, up-to-date business continuity and disaster recovery plans for business interruptions all in one platform with Keylight from Lockpath.
  • More Data. Less Risk: How to Grow Secure Marketplaces
    More Data. Less Risk: How to Grow Secure Marketplaces Jeremy Gottschalk (Marketplace Risk Management), Jose Heftye (Marsh) & David Thomas (Evident) Recorded: Feb 1 2018 49 mins
    From travel to staffing to babysitting, businesses are creating marketplaces. These ecosystems can only thrive when users feel confident that the data they are providing will be protected and businesses can be confident that the individuals using the platform are who they say they are. As businesses face more regulatory requirements and reputational risks that come with the threat of a data breach, finding efficient ways to manage identity authenticity is even more critical. With information becoming increasingly digitized, how do companies create safe, authentic platforms for their users without increasing the friction that typically comes with that protection?

    Businesses need to change their playbook for managing online identity. This discussion will focus on how businesses can build secure ecosystems that are founded on authenticity but created to scale with less friction and risk, mitigating the need to hold and secure personal data.

    Key Takeaways:
    - Understand the key obstacles faced by companies in assuring that individuals are who they say they are
    - Get a playbook to revolutionize the way you handle data and identity management
  • Smile & Sign Demo
    Smile & Sign Demo Tommy Petrogiannis – President at eSignLive by VASCO & Guillaume Teixeron – Product Manager at VASCO Recorded: Jan 30 2018 7 mins
    Credit unions can build Smile & Sign into an existing banking app to upsell members, enabling them to apply for instant access to credit or other financing. To do so, the member opens the financial institution’s app and enters the amount of credit desired, then takes a “selfie” and signs on the phone’s screen.
  • A New Approach to IT Risk Identification
    A New Approach to IT Risk Identification Sam Abadir - VP of Industry Solutions, Lockpath Recorded: Jan 30 2018 24 mins
    Risk management often takes on different forms throughout the business. Some approaches are very strategically focused, some are very technology focused and some are even missing. During this webinar, LockPath’s Sam Abadir will discuss how IT departments can identify risks in a way that is not only meaningful to their operations but also meaningful to other parts of the business. Abadir will talk about how this approach not only improves risk management but also makes IT a more valued part of the business.
  • Training Snapshot: Litigation Hold Notifications from CloudNine
    Training Snapshot: Litigation Hold Notifications from CloudNine Brian Kelley Recorded: Jan 25 2018 5 mins
    A snapshot demonstration of the process required to generate a Legal Hold Notification to potential custodians from within the CloudNine eDiscovery Platform as well as to send reminder and follow up notices to those custodians and generate tracking reports.

    Issuing a properly documented Legal Hold Notification can go a long way in showing due diligence efforts to meet your duty to preserve. The ability to automate the issuance and tracking of legal hold notices helps eDiscovery practitioners save considerable time and effort to demonstrate the satisfaction of their preservation obligation.

    Training Snapshot Presenter: Brian Kelley

    Brian is the Director of Customer Success for CloudNine. At CloudNine, Brian manages training, support and customer success efforts for CloudNine's Software-as-a-Service (SaaS) eDiscovery clients. Brian has extensive experience providing legal technology consulting and technical support services to numerous commercial and government clients ranging from multinationals corporations and large law firms to litigation support providers and governmental agencies.
  • Oracle Audits
    Oracle Audits Dave Welch, House of Brick Technologies; Pam Fulmer, Fulmer Ware Recorded: Jan 25 2018 60 mins
    In this session, we will provide a summary of Oracle licensing by the contract, and explore Oracle audit practices referencing the Mars Incorporated lawsuit against Oracle.

    We will share recommendations to help you prepare for an Oracle audit, including VMware licensing information.
  • OCC 2018 Part 3: Change Management to Address New Regulations
    OCC 2018 Part 3: Change Management to Address New Regulations Sam Abadir, Director of Product Management, LockPath Recorded: Jan 25 2018 31 mins
    The Office of the Comptroller of the Currency (OCC) recently released its operating plan priorities for 2018. A top priority is change management to address new regulation requirements. Whether you’re a banker or service provider to the financial industry, you may be aware of updated or new regulations like the National Flood Insurance Reform Act of 1994, the Military Lending Act, and the Prepaid Card Rule. In this webinar, you’ll learn what OCC’s Compliance and Community Affairs (CCA) Department intends to focus on and the role of technology in managing compliance and risk.

    Attendees will learn:

    • What to consider when designing, operating or improving their change management process
    • The increased focus on fair lending from a quantity and quality perspective
    • Policies, procedures, and processes for credit offered under the Military Lending Act
    • What CCA examiners are looking for with banks relying on third-party relationships
    • How GRC technology supports compliance and integrated risk management programs

    Don’t miss this future focused webinar on an OCC priority for 2018. Make plans now to attend.
  • Papierlose Abrechnung: Fakten statt Vorurteile
    Papierlose Abrechnung: Fakten statt Vorurteile Jens Schneider (SAP Concur), Stefan Groß, Steuerberater GoBD-Experte Recorded: Jan 25 2018 59 mins
    Sie würden mit digitaler Belegarchivierung gerne Einsparpotenziale und Prozessoptimierungen realisieren, sind sich aber unsicher, was die gesetzlichen Voraussetzungen angeht? Hören Sie sich jetzt vom Experten, wie Steuerrecht und Digitalisierung zusammenpassen und wie Sie selbst von papierloser Abrechnung profitieren können.
  • On the Move - Die Reise von der On-Premise Welt in die Cloud
    On the Move - Die Reise von der On-Premise Welt in die Cloud Andreas Klein, Benjamin Tattermusch (SAP Concur) Recorded: Jan 25 2018 46 mins
    In diesem 45-minütigen Webinar sind wir den grundlegenden Unterschieden der Cloud gegenüber einer On-Premise-Lösung im Geschäftsreisemanagement auf den Grund gegangen und haben gezeigt, wie Ihr Unternehmen mit einer SaaS-Lösung fit für die Zukunft ist..
  • Training Snapshot: Preservation and Collection from CloudNine
    Training Snapshot: Preservation and Collection from CloudNine Brian Kelley Recorded: Jan 25 2018 5 mins
    A snapshot demonstration of the process required to quickly initiate and complete the preservation and collection of electronically-stored information (ESI) with the CloudNine eDiscovery Platform.

    Delivered as an integrated and automated capability in CloudNine's cloud-based, Software-as-a-Service eDiscovery automation software, Preservation and Collection from CloudNine improves collection workflow by efficiently and comprehensively accelerating legal and IT team ability to detect, identify, locate, and collect ESI in a targeted, comprehensive manner. And once collected through an automated ingestion process, ESI is automatically processed and prepared for analytics and review in support of litigation, investigations, or audits.

    Training Snapshot Presenter: Brian Kelley

    Brian is the Director of Customer Success for CloudNine. At CloudNine, Brian manages training, support and customer success efforts for CloudNine's Software-as-a-Service (SaaS) eDiscovery clients. Brian has extensive experience providing legal technology consulting and technical support services to numerous commercial and government clients ranging from multinationals corporations and large law firms to litigation support providers and governmental agencies.
  • Fürsorgepflicht - sind Sie für den Ernstfall vorbereitet?
    Fürsorgepflicht - sind Sie für den Ernstfall vorbereitet? Andreas Krugmann, Frank Emmerich (SAP Concur) Recorded: Jan 23 2018 53 mins
    Fürsorgepflicht: Jeder Zweite glaubt, dass Arbeitgeber im Krisenfall überfordert wäre. Mit Concur Locate kommen Sie Ihrer Fürsorgepflicht umfänglich nach. Werfen Sie jetzt einen Blick in das Tool, um zu erfahren, wie Sie sich ganz einfach um Ihre Reisenden kümmern können.
  • Using GRC to Tackle Operational Risk Management
    Using GRC to Tackle Operational Risk Management Sam Abadir - VP of Industry Solutions, Lockpath Recorded: Jan 23 2018 39 mins
    Operational risk management (ORM) is a growing discipline within an organization’s integrated risk management program. Practitioners identify how daily managed activities and external events impact strategic goals, value creation, and operations. Managing operational risk can be challenging, in part, because of the inability to fully understand how risk impacts value.

    In this fast-paced webinar, LockPath’s Sam Abadir shares current ORM trends and challenges, Lockpath’s ORM maturity model and how a governance, risk management, and compliance (GRC) processes can address ORM.

    Specifically, you’ll learn about the following:

    • A practical guide to ORM processes, including current trends and challenges
    • The impact of daily managed activities and external events on overall business operations and strategic goals
    • One organization that uses a GRC solution to conduct ORM and create value
    • How a GRC platform can help you avert crisis and embrace risk
  • 2018 - The Best Year for Cyber Criminals. Period
    2018 - The Best Year for Cyber Criminals. Period Amar Singh, Wieland Alge, Ramses Gallego, Mark Grantz, Tushar Vartak Recorded: Jan 19 2018 76 mins
    Meltdown and Spectre have set the scene for 2018 and make attending our webinar even more of an imperative. This year is going to see it all and we have top panellists and audience members joining. The US Secret Service’s Mark Grantz, Middle East’s top Cybersecurity executive, Tushar Vartak, Europes most recognised Cybersecurity and AI visionary Ramses Gallego, Cybersecurity SME Wieland Alge, a NATO cleared hacker and of course, your very own Amar Singh, CISO and co-founder of Wisdom of Crowds and Cyber Management Alliance Ltd.

    Join the debate, Share your opinions and hear a wide range of experts share their experience and insights.

    Cyber Management Alliance brings you our interactive and educational webinar, inaugurating the new year with an exclusive webinar on what to expect, how and what the criminals are going to do (or not do) and what you can do to protect yourself.

    Yes, we know GDPR is around the corner, but we believe there is much more ahead than just privacy concerns.
  • GDPR Is Coming - Is Your Organization Ready? Key Steps to Help You Prepare
    GDPR Is Coming - Is Your Organization Ready? Key Steps to Help You Prepare Amar Singh, Guy Cohen, Dr.Rula Saya, Punit Bhatia Feb 21 2018 1:00 pm UTC 60 mins
    On May 25 the long-awaited General Data Protection Regulation (GDPR) will go into effect across Europe. GDPR is the biggest overhaul of data protection laws in more than two decades. How prepared is your organization for GDPR?

    Join this interactive panel of experts as they discuss:
    - What is GDPR?
    - Why should you be GDPR-compliant?
    - How to achieve compliance?
    - Steps your organization should take today to prepare for GDPR
    - Other GDPR considerations

    Panelists

    Amar Singh - CEO, Cyber Management Alliance Ltd
    Dr Rula Sayaf - PhD in privacy, security, and data science, GDPR Expert
    Punit Bhatia, DPO and author - be ready for GDPR.
    Guy Cohen, Strategy and Policy Lead, Privitar
  • eDiscovery and the GDPR: Ready or Not, Here it Comes!
    eDiscovery and the GDPR: Ready or Not, Here it Comes! Doug Austin and Tom O'Connor Feb 21 2018 6:00 pm UTC 75 mins
    Do you think that your organization isn’t subject to the requirements of Europe’s impending General Data Protection Regulation (GDPR)?  You may be wrong about that.  If it is, are you on target to be compliant by May 25?  This CLE-approved* webcast session will cover how data privacy requirements have evolved over time, the parameters associated with the GDPR, what they mean to your organization and what steps your organization needs to take to ensure compliance with the GDPR.  Topics include:
     
    + How Data Privacy Requirements Have Evolved in the US and Europe
    + Scope of the GDPR Beyond the EU
    + A Definitional Baseline for GDPR
    + Important Changes and Organizational Impact
    + Data Existence and GDPR Compliance
    + Challenges Presented by Privacy Rights Associated with the GDPR
    + Fines: The Potential Cost of Non-Compliance
    + Business of the GDPR: Controllers and Processors
    + Steps to Take to Comply with the GDPR

    Presentation Leader: Doug Austin

    Doug is the VP of Products and Professional Services for CloudNine. At CloudNine, Doug manages professional services consulting projects for CloudNine clients. Doug has over 25 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients. 

    Special Consultant to CloudNine: Tom O'Connor

    Tom O’Connor is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems. Tom’s consulting experience is primarily in complex litigation matters.

    * MCLE Approved in Selected States
  • DriveLock Smart AppGuard - Keine Chance für Ransomware
    DriveLock Smart AppGuard - Keine Chance für Ransomware Falk Trümner, DriveLock Senior PreSales Consultant Feb 22 2018 10:00 am UTC 45 mins
    Wie gehen die Angreifer vor, was können Sie für Maßnahmen ergreifen und wie verwundbar ist Ihre IT derzeit? Aktuell stellen sich zahlreiche Unternehmen die gleichen Fragen, denn die Angriffe von Ransomware-Trojanern haben spürbare Verunsicherung hinterlassen.
  • How to Buy a GRC Platform
    How to Buy a GRC Platform Adam Billings - Principal Consultant, Lockpath Feb 22 2018 5:00 pm UTC 60 mins
    Buying a GRC platform isn’t so much about sizing up the options as it is about analyzing your company’s needs. After that, it’s about knowing which questions to ask vendors and how to evaluate their offerings while keeping business processes front and center. In this webinar, we’ll share how to self assess needs and benchmark your GRC maturity. Throughout the hour, we’ll offer buyer’s tips and empower you to buy the GRC platform that’s right for your company.

    In this webinar, you will discover:

    • How to assess your organization and determine what type of platform is right for you
    • What questions to ask when evaluating GRC vendors
    • Tips for building a business case for a GRC platform and estimating potential ROI

    In our increasingly competitive and digital world, organizations need to evolve to be more competitive. For many, an untapped resource is GRC and its role in increasing efficiency and organizational resiliency. Explore what’s possible in this educational webinar.
  • A Silver Bullet for Zero-day and Ransomware Attacks
    A Silver Bullet for Zero-day and Ransomware Attacks Jason Rose, Senior Security Consultant Feb 26 2018 6:00 pm UTC 60 mins
    How to address the unknown of Zero-day threats and cryptoware variants.

    Anti-virus and anti-malware has a fundamental flaw that’s becoming more and more obvious: it needs a catalog of all the malicious software in the world in order to work effectively. Building this catalog is an impossible task; new exploits (“zero-day exploits”) are created every day and often go undetected for months at a time. The gap between the release and the discovery of malicious software is where the real threat to your organization lies. DriveLock addresses this gap with application whitelisting, and with DriveLock Smart AppGuard, maintaining that whitelist is easier than ever before.

    Takeaways:
    Anti-virus and anti-malware software is fundamentally flawed. A time lag will always exist between release of an exploit and its discovery; that time lag can mean your systems are vulnerable to that exploit for weeks or even months at a time.

    Application whitelisting addresses this flaw by taking the opposite approach of anti-malware: instead of providing a list of software the system is NOT allowed to run, it provides a list of software it IS allowed to run. Zero-day exploits never even have a chance to run because they aren’t on the approved list of software.

    By using a cryptographic hash function to positively identify software files, attackers can’t impersonate an entry on the whitelist. File name, file location, and file owner whitelist rules can all be easily circumvented.

    With DriveLock’s Smart AppGuard, the work that goes into maintaining an application whitelist database is effectively cut to zero. Enjoy the security of application whitelisting without the headaches of whitelist database maintenance.
  • REACH FOR THE SKY...........
    REACH FOR THE SKY........... Mark Elwood, Marketing Director, TeleWare Feb 27 2018 11:00 am UTC 60 mins
    ........the adoption of next generation cloud services for voice and eCommunication compliance.

    New regulations such as MiFID II mean that the regulatory requirement for recording, storage and retrieval of communication data has grown exponentially. Infrastructure and governance overheads and security must be managed wisely, utilising next generation technologies where available to ensure compliance is cost-effective, robust and meets required SLAs.

    Join a group of industry experts including TeleWare and Microsoft to hear more about how financial markets players are turning to the cloud to meet and surpass exacting standards in recording, storage, retrieval and governance for communications data.

    This webinar will be an interactive panel session discussing:
    • Cloud services for Cap Markets - how have cloud services developed to meet the exacting standards of the investment banks and brokers?
    • Why now is the time for cloud services in capital markets.
    • Voice and eCommunication recording – why the cloud is taking the sting out of the increased data storage requirements for MiFIDII.
    • Compliance-specific requirements – including data security and in-country storage.
    • Hybrid deployment models – leveraging cloud services alongside existing enterprise environments.
    • Cost factors – how TCO can be significantly reduced by intelligent outsourcing, including cost of governance, security and compliance.
    • Reaching new heights – methods of migration, deployment and ongoing data management.
    • And why uncertainty about Brexit is driving the need for more flexibility to scale up or down across different geographies.

    The session will be hosted by Mark Elwood, Marketing Director, TeleWare

    Panelists:
    Ian Salmon, Director, IgniteG2M Limited. Specialist regulatory advisers
    Andrew Fawcett, MiFID II Product Manager, TeleWare
    Hannah Cawthorne, Financial Services Industry Lead, Microsoft
  • Digitising Customer Onboarding
    Digitising Customer Onboarding Abe Smith, Founder & CEO, Dealflo Feb 27 2018 12:00 pm UTC 60 mins
    Digitising Customer Onboarding: How to improve the customer experience without compromising on compliance and risk

    Today’s consumers, accustomed to receiving smart and convenient digital services from companies such as Uber, Apple and Amazon, and are beginning to demand personalised, interactive and immediate services from their banks.

    A recent report revealed 42% of UK consumers have adopted FinTech services (EY 2017 FinTech Adoption Survey), so it’s no surprise banks want to adapt to the fast-moving digital marketplace where new and disruptive competitors are already circling. What’s stopping them though, is risk.

    Creating an environment that drives the productivity, speed and compliance essential to sell financial services via digital channels is paramount to survival.

    This webinar will explore how banks can digitise the customer onboarding process without compromising on risk, satisfying customers, regulators and shareholders alike.
  • Derivatives Update: Recent Developments in the US and EU
    Derivatives Update: Recent Developments in the US and EU Julian Hammar, Jeremy Jennings-Mares, James Schwartz – Morrison & Foerster Feb 28 2018 4:00 pm UTC 90 mins
    In this session, we will provide an update on recent developments affecting derivatives in the US and EU and prospects for regulatory harmonization between the two jurisdictions. Topics covered include:

    With respect to the EU:
    - aspects of Mifid II relating to derivatives, including requirements in relation to trading, margin, transaction reporting and position limits; and
    - current proposals regarding the supervision of central counterparties and potential amendments to Emir.

    With respect to the US:
    - the recent Treasury Reports and their suggestions for cross-border matters; and
    - the CFTC’s order exempting EU trading facilities from the requirement to register with the CFTC, comparability determination with respect to the EU margin rules and extension of existing relief in relation to swaps data reporting.
  • How to Determine Active Directory Group Ownership
    How to Determine Active Directory Group Ownership Douglas Bayne, Director of Professional Services, at SPHERE Technology Solutions Feb 28 2018 6:00 pm UTC 60 mins
    This webinar covers how to identify AD group owners for organizations. Our Director of Professional Services, Douglas Bayne, discussed how we figure out where ownership is missing, inaccurate or inconsistent, identifying all the different data sources that provides clues on ownership, how to catalogue probable ownership but also have a second or third option, where to keep track of ownership and report on future misconfigurations and a sneak peek into how to validate ownership.

    This webinar covers how to identify Active Directory group owners for organizations. Join this interactive webinar with SPHERE Director of Professional Services, Douglas Bayne, as he discusses:

    -How to figure out where ownership is missing, inaccurate or inconsistent
    -How to identify all the different data sources that provide clues on ownership
    -How to catalogue probable ownership but also have a second or third option
    -Where to keep track of ownership and report on future misconfigurations
    -A sneak peek into how to validate ownership

    About the presenter:
    As the Director of Professional Services for SPHERE Technology Solutions, Douglas Bayne oversees Project Managers and Security Engineers; ensuring that they provide a clear strategy for clients to address their data governance, security and compliance needs. Bayne brings over 20 years of experience in managing global infrastructure solutions, and has a proven track record of delivering multi-million dollar projects on-time and on-budget. Acting as a strategic business partner with clients, Bayne can bring innovative technology solutions to bear; with the on-going mission of meeting current and future needs.
  • Balancing Risk, Compliance, and Performance in Data Analytics
    Balancing Risk, Compliance, and Performance in Data Analytics Scott Jeschonek, Director of Cloud Products (Avere) and Leonord Law, Product Manager (Google Cloud) Feb 28 2018 7:00 pm UTC 60 mins
    In this webinar, Avere Systems and Google Cloud explore the ways in which alternative asset managers are leveraging technology to drive improved profitability data without large capital investments in infrastructure.

    Today’s hedge fund managers are consistently analyzing greater volumes of data, with more speed, from a plethora of sources, with the end ambition of generating more alpha. Balancing the growing risks associated with proprietary data, compliance and regulatory restrictions, while supplying top-level performance is a dilemma facing IT managers everywhere.

    In this webinar we will discuss:

    – The trends driving increased demand for analytics in the alternative asset management sphere
    – Considerations for leveraging the cloud for short-term backtesting workloads
    – Practical tips for overcoming potential obstacles of latency, data movement, and lock-in
  • EU Datenschutzgrundverordnung (EU-DSGVO) - Was Entscheider jetzt tun müssen
    EU Datenschutzgrundverordnung (EU-DSGVO) - Was Entscheider jetzt tun müssen Oliver Zellner, DriveLock Senior Sales Manager Mar 1 2018 10:00 am UTC 45 mins
    Ab Mai 2018 steigen die Anforderungen für die IT-Sicherheit deutlich, denn dann kommt die EU-Datenschutzgrundverordnung (EU-DSGVO) zur Anwendung.
    Mit ihr wird der Datenschutz in Europa vereinheitlicht. Erfüllt Ihr Unternehmen die neuen Datenschutzvorschriften?
    Erfahren Sie in unserem aktuellen Webinar, wie Sie mit DriveLock die Sicherheitsmaßnahmen in Ihrem Unternehmen optimieren und alle zukünftigen Anforderungen der DSGVO erfüllen.
  • Adoptez l’ Omnicanalité avec Openbravo Commerce Cloud
    Adoptez l’ Omnicanalité avec Openbravo Commerce Cloud Anne Bardon, Lead Generation Manager at Openbravo Mar 1 2018 10:30 am UTC 60 mins
    Ce webinar expliquera comment les fonctions omnicanal d'Openbravo Commerce Cloud vous donneront, à vous détaillants spécialisés, un avantage compétitif sur le marché français du Retail.
  • Roadmap to Smarter Compliance & Policy Management
    Roadmap to Smarter Compliance & Policy Management Sam Abadir - VP of Industry Solutions, Lockpath Mar 8 2018 5:00 pm UTC 60 mins
    In our uncertain regulatory climate, complying with regulations and managing policies demand that organizations be adaptable. For firms that are still using office tools like word processors, spreadsheets and emails, the challenge to adapt is even greater. In this live webinar, Lockpath’s Sam Abadir will share a roadmap to smarter compliance and policy management.

    Attendees will learn:

    • What compliance and policy management encompasses
    • Communication strategies for working with cross-functional teams
    • How organizations are bringing automation to manual processes
    • Low-hanging fruit for quick wins and ideas for sustained growth

    The road ahead is uncertain and demands that organizations adapt. Why stop there? Keep going to reach a better place with your compliance and policy management program. Explore what you need to know in this educational webinar.
  • Live Demo Breaking the Ageing Security Infrastructure in Cloud Providers
    Live Demo Breaking the Ageing Security Infrastructure in Cloud Providers Amar Singh, Klaus Gheri Mar 9 2018 1:00 pm UTC 75 mins
    The title says it all folks - we are going to talk about what's broken in the cloud and do a demo of why it is so easy to break down the current security infrastructure that most companies deploy in the cloud.

    Join me, Amar Singh and other specialists including

    - Amar Singh - CEO & Founder, Wisdom of Crowds and Cyber Management Alliance

    - Klaus Gehri - Specialist Cloud Security, VP Barracuda

    - TBC -
  • KYC Compliance for ICOs Made Easier
    KYC Compliance for ICOs Made Easier David Andrews – IdentityMind Mar 14 2018 6:00 pm UTC 60 mins
    Over $4 billion was raised through ICOs in 2017, attracting attention from entrepreneurs and regulators alike. How should a company raising funds through an ICO manage its anti-money laundering (AML) requirements without turning away customers, getting sued, or getting fined by various governments?

    IdentityMind provides a compliance plug-in that enables you to quickly deploy the KYC and AML capabilities that you require to check ICO participants without the hassle. The plug-in lets you:

    •Know where contributors are coming from
    •Block geographies or regions you cannot, or do not want to, work with
    •Perform risk-based KYC, complying with regulations of various governments
    •Provide examiner and auditor reports where required
    •Validate the risk of any Bitcoins used during the ICO event

    Join us in this webinar as we take you through these features, and how they work together to result in an ICO you can confidently launch around the world.
  • Do You Wish Cyber Security Had an Easy Button?
    Do You Wish Cyber Security Had an Easy Button? Brett Chadwick, Senior Pre-Sales Engineer at DriveLock and Martin Mangold, Head of SaaS Operations at DriveLock Mar 15 2018 5:00 pm UTC 60 mins
    Now it does with DriveLock introducing, preconfigured security postures delivered from the Cloud. Managed by DriveLock; block devices, ensure compliance all without any interaction. Cyber Security made easy!
  • First – Fix the Plumbing - What’s broken in cyberspace and How to Fix it
    First – Fix the Plumbing - What’s broken in cyberspace and How to Fix it Amar Singh, Adam Gladsden Mar 16 2018 1:00 pm UTC 75 mins
    The elephant in the room? Quite a few actually. However, in this webinar, we go back to the roots of the Internet and explore why we need to pause and assess the maturity of how we maintain this important but often shunned elementary control.

    Join Amar Singh and other experts in this interactive webinar where we take a deep dive into the various insecure components that underpin cyberspace and how NOT fixing them is costing online businesses.

    Panelists -

    Amar Singh - CEO and Founder Wisdom of Crowds, Cyber Management Alliance Ltd

    Adam Gladsden - SME cybersecurity

    NH - NATO Cleared Cybersecurity Researcher
  • Live Webinar: Integrierte Buchung & Reisekostenabrechnung
    Live Webinar: Integrierte Buchung & Reisekostenabrechnung SAP Concur Jochen Alig Senior Solutions Consulting Stas Litau Inside Sales Representative Mar 20 2018 2:00 pm UTC 45 mins
    Aufwendige Reisekostenabrechnungen auf Papier oder in Excel-Tabellen gehören in Unternehmen der Vergangenheit an. Erfahren Sie, warum Automatisierung die Lösung auch für komplexe Reisetätigkeit ist.
  • Security Awareness - Sicherheitsbewusstsein aller Mitarbeiter schärfen
    Security Awareness - Sicherheitsbewusstsein aller Mitarbeiter schärfen Martin Mangold, DriveLock Head of SaaS Operations Mar 22 2018 10:00 am UTC 45 mins
    Zusätzlich zu Angreifern von außen stellt das Verhalten von Mitarbeitern eine Gefahr für Unternehmen dar. Deswegen muss das Sicherheitsbewusstsein aller Mitarbeiter geschärft werden, um das Risiko von internen Bedrohungen zu minimieren. Das Aufgabenfeld von Sicherheitsteam steigt somit weiter an.
  • Reg Watch: NERC CIP-013-1 - Cyber Risk in the Supply Chain
    Reg Watch: NERC CIP-013-1 - Cyber Risk in the Supply Chain Patrick Miller - Archer Energy Solutions; Tony Rock - Lockpath Mar 29 2018 4:00 pm UTC 60 mins
    Managing cyber risk in the supply chain is a requirement for protecting our critical infrastructure. As a result, the North American Electric Reliability Corporation (NERC) has introduced reliability standard CIP-013-1 to help Utilities and their vendors understand and mitigate these risks. In this webinar presented by Archer Energy Solutions and Lockpath, we'll explore strategies and best practices for managing supply chain risk and how you can prepare for when CIP-013-1 is enacted. As a webinar attendee, you'll learn:

    · Potential impact CIP-013-1 will have on both utilities and their vendors
    · Risk program maturity requirements for advanced cybersecurity
    · Strategies for managing supply chain risk holistically
    · Steps to take now to strengthen your supply chain cyber security

    Whether you are a utility provider or provide for utilities, discover what you should know and do about NERC CIP-013-1 and supply chain cyber risk in this webinar.

    Register now.
  • Roadmap to Smarter IT Risk Management
    Roadmap to Smarter IT Risk Management Sam Abadir - Lockpath Apr 5 2018 4:00 pm UTC 60 mins
    The latest data breach or vulnerability may capture headlines and prompt speculation, but where the rubber meets the road is being smarter about IT risk management (ITRM). In this webinar, you'll learn what being wiser entails, including:

    · What IT and security disciplines ITRM encompasses
    · How to tailor your ITRM message to different departments
    · Strategies for working with cross-functional teams
    · Advantages and disadvantages of using spreadsheets
    · Quick wins and ideas for sustained growth

    Don't wait for a breach or a vulnerability to get smarter about ITRM. Learn what you need to know to get where you're going. Register for this webinar.
  • Could You Connect This USB Drive to Your Computer for Me? Security Awareness
    Could You Connect This USB Drive to Your Computer for Me? Security Awareness Brett Chadwick, Senior Pre-Sales Engineer at DriveLock Apr 5 2018 5:00 pm UTC 60 mins
    People like to help people and this trait makes user awareness key to security within the organization. The right look, a smile or the right question could be enough to penetrate your security defenses.
  • Künstliche Intelligenz zur Abwehr von Cyberangriffen im Industrie 4.0 Umfeld
    Künstliche Intelligenz zur Abwehr von Cyberangriffen im Industrie 4.0 Umfeld Falk Trümner, DriveLock Senior PreSales Consultant Apr 12 2018 9:00 am UTC 45 mins
    In den letzten 2 Jahren häufen sich massiv Cyberattacken in der Produktion bei Industrieunternehmen. Viele Fertigungsstandorte sind heute nicht gegen Cyberattacken von intern geschützt und somit ein lohnendes Ziel. Wir zeigen mit DriveLock SmartAppGuard wie dies zuverlässig verhindert werden kann und somit für Industrieunternehmen kein Schaden entsteht.
  • BadUSB - Die Gefahr und Schutzmöglichkeiten mit DriveLock Smart DeviceGuard
    BadUSB - Die Gefahr und Schutzmöglichkeiten mit DriveLock Smart DeviceGuard Mario Schwalm, DriveLock Senior Manager PreSales Apr 19 2018 9:00 am UTC 45 mins
    Die Demonstration einer Sicherheitslücke bei der Nutzung der USB-Schnittstelle, genannt BadUSB, geistert derzeit durch die internationale Presse. Doch was steckt wirklich dahinter und wie kann man sich davor schützen?
  • Breaking the Internet - Internet Takedown Strategies Used by Cyber Criminals
    Breaking the Internet - Internet Takedown Strategies Used by Cyber Criminals Amar Singh Apr 27 2018 12:00 pm UTC 75 mins
    We take multiple views from top hackers on how they would and could break the Internet - surprisingly simple and powerful, many of these techniques can completely knock-off the Internet let alone bring your organisation to its knees and impact its bottom-line.

    The simplicity and success rate are so high it’s no wonder organisations keep getting compromised.

    Join me, Amar Singh, as I discuss this and mitigating strategies with the top brains in the industry. Names of the hackers will be disclosed soon.