Hi [[ session.user.profile.firstName ]]

Audit and Compliance

  • Security+ Objective 1.1
    Security+ Objective 1.1
    Donald E Hester & Robert DeRoeck Recorded: Jun 17 2019 59 mins
    In this webinar we are going to cover CompTIA’s SY0-501 Security+ certification exam objective 1.1: Given a scenario, analyze indicators of compromise and determine the type of malware.
    Viruses, Crypto-malware, Ransomware, Worm, Trojan, Rootkit, Keylogger, Adware, Spyware, Bots, RATs, Logic Bombs, Backdoors, Cryptojacking, Formjacking, Doxware
  • So macht Concur Locate Ihr Business sicherer
    So macht Concur Locate Ihr Business sicherer
    Jochen Alig & Moritz Völker (SAP Concur) Recorded: Jun 17 2019 24 mins
    Im dieser Webinar-Aufzeichnung erfahren Sie, wie Concur Locate den permanenten Kontakt zu Ihren Reisenden ermöglicht: nicht nur in Krisenfällen sondern auch mit nützlichen Tipps und firmenspezifischen Hinweisen zu Transport oder den Regeln vor Ort. Immer genau da, wo Ihr Mitarbeiter es braucht. Zudem ist die Kommunikation unabhängig davon, wo und wie die Reisen gebucht wurden – Concur Locate führt alle Daten zusammen.
  • Mobile Apps and Single Sign-On
    Mobile Apps and Single Sign-On
    Andre Priebe, CTO, iC Consult Group Recorded: Jun 14 2019 57 mins
    When it comes to integrating mobile apps into the single sign-on environment, conflicts of interest often arise between designers, IT security, and what the customer really wants.

    What influence does the chosen login procedure have on security, and which approaches have proven themselves in practice? What compromise could satisfy the customer and still offer a sufficient level of security? Discover current best practices and find out what role OAuth 2.0 plays in them.

    1. Conflict of interest – designer, end customer, and IT security
    2. Influence of login method on user satisfaction
    3. Security assessment
    4. Best practices, procedures, and recommendations
    5. OAuth 2.0 as a possible solution
  • The Scaling Challenge: Bringing RPA to the Next Level using Process Discovery
    The Scaling Challenge: Bringing RPA to the Next Level using Process Discovery
    Warren Ledingham, GM APAC, Kryon Recorded: Jun 13 2019 27 mins
    Robotic Process Automation (RPA) enables organizations to create virtual workforces that increase process efficiency, reduce errors, and cut operational costs. However, even when enterprises implement RPA, many are challenged with scaling it across the organization and identifying all the potential business processes that can and should be automated for maximum ROI. This presentation will discuss how companies overcome these challenges using AI powered process discovery.

    Robotic Process Automation (RPA) enables organizations to create virtual workforces that increase process efficiency, reduce errors, and cut operational costs. However, even when enterprises implement RPA, many are challenged with scaling it across the organization and identifying all the potential business processes that can and should be automated for maximum ROI. This presentation will discuss how companies overcome these challenges using AI powered process discovery.
  • Mobile Apps und Single Sign-On
    Mobile Apps und Single Sign-On
    Andre Priebe, CTO, iC Consult Group Recorded: Jun 13 2019 61 mins
    Wenn es um die Integration von Mobile Apps in die Single Sign-On-Umgebung geht, dann entstehen oft Interessenskonflikte zwischen Designern, der IT-Sicherheit und dem, was der Kunde wirklich möchte.

    Welchen Einfluss hat das gewählte Login-Verfahren auf die Sicherheit und welche Ansätze haben sich in der Praxis bewährt? Wie kann ein Kompromiss aussehen, der sowohl den Kunden zufriedenstellt, aber trotzdem ein ausreichendes Sicherheitsniveau bietet? Erfahren Sie, welche Best Practices es gibt und welche Rolle OAuth 2.0 dabei spielt.

    Interessenskonflikt – Designer, Endkunde und die IT-Sicherheit
    Einfluss der Login-Methodik auf die Benutzerzufriedenheit
    Sicherheitsbetrachtung
    Best-Practices, Vorgehensweisen und Empfehlungen
    OAuth 2.0 als Lösungsoption
  • The State of E-Discovery 2019
    The State of E-Discovery 2019
    EDRM and Exterro Recorded: Jun 12 2019 60 mins
    E-Discovery continues to emerge as a growing influence in the legal world. Beyond just litigation, e-discovery considerations are playing a tremendous role in regulatory and compliance activities with the new and soon to enacted legislation (e.g. California Consumer Privacy Act, GDPR).
    In for this upcoming webcast, take a comprehensive look back at the last year in e-discovery and learn best practices for managing e-discovery processes in an effective and efficient manner throughout your legal department.
    Register now for this webcast and learn:
    - E-Discovery spend trends and how legal teams are trying to manage e-discovery spend
    - How legal departments are trying to be more efficient and improve their processes
    - How to maintain e-discovery defensibility in a converging legal world between litigation, compliance and regulatory areas of practice

    Speakers:
    Deana Uhl, Senior Director, FTI Technology
    Nishad Shevde, Managing Director - Client Operations, Exterro
    Mike Hamilton, Director of Marketing, Exterro
  • Ensure Organizational Compliance with CCPA
    Ensure Organizational Compliance with CCPA
    Sam Abadir, Lockpath Recorded: Jun 12 2019 45 mins
    The California Consumer Privacy Act (CCPA) is the first major U.S. privacy law to unfold. This law has interested other states in following suit, which may soon call for a national U.S. Privacy Law. Organizations are uncertain how to comply with CCPA, which takes effect January 1, 2020.

    In this live webinar, Lockpath’s Sam Abadir will share what preparation for CCPA compliance entails, including:

    • Protecting consumer data
    • Applying technology to processes
    • Managing multiple channels for consumers exercising their rights
    • Ensuring a fast response to breaches
    • Requirements of CCPA
    • Strategic approach to CCPA
    • Best practices for managing CCPA
    • Best practices for responding to privacy incidents

    As an attendee you’ll learn how to approach CCPA to prepare yourself for the new law in 2020 and set the foundation for other privacy laws as they impact your organization. Register now!
  • Die Vorteile einer integrierten Reisekostenplattform
    Die Vorteile einer integrierten Reisekostenplattform
    Andreas Klein (Director Solution Consulting, SAP Concur), Benjamin Tattermusch (Regional Sales Executive, SAP Concur) Recorded: Jun 12 2019 32 mins
    Erhalten Sie in diesem Webinar Einblicke in die Welt von SAP Concur. Erfahren Sie von Andreas Klein (Director Solution Consulting) und Benjamin Tattermusch (Regional Sales Executive) die Vorteile des End2End-Prozesses in Kombination mit einer integrierten Reisekostenplattform und dem SAP Concur Partner-Ecosystem.

    Sie wollen zu Travel & Expense Management auf dem Laufenden bleiben? Dann registrieren Sie sich jetzt für den News-Service von SAP Concur: https://bit.ly/2GZRZba
  • The State of Alternative Credit Data
    The State of Alternative Credit Data
    Kevin King, Head of Product Marketing at ID Analytics and Leslie Parrish, Senior Research Analyst at Aite Recorded: Jun 11 2019 60 mins
    Over the past few years alternative data has emerged as a critical best practice for card issuers – offering a more complete picture of consumer creditworthiness, and with that an opportunity to fine tune competitive lending strategies. But keeping track of best practices in such a rapidly evolving space is no easy task.

    This presentation will provide an update on the world of alternative credit data, shedding new light on its ability to assess credit invisibles, its application in prescreen and portfolio management use cases, and clarifying the pros and cons of contributed vs. permissioned alternative data solutions. By providing a current snapshot of the opportunities and landmines, this presentation will deliver an essential perspective to help lenders demystify the world of alternative data in 2019.
  • Innove rápidamente e impulse la agilidad de negocio minorista con la nube
    Innove rápidamente e impulse la agilidad de negocio minorista con la nube
    Ismael Ciordia, CTO & Client Success Officer at Openbravo Recorded: Jun 11 2019 45 mins
    Este webinar resaltará las razones clave para que negocios minoristas adopten plataformas basadas en la nube como Openbravo Commerce Cloud. Esto incluye: mayor agilidad de negocio, reducción de costes y mejores capacidades de integración.
  • Immer die aktuellen Ausgaben im Blick - mit Budget von SAP Concur
    Immer die aktuellen Ausgaben im Blick - mit Budget von SAP Concur
    Severin Schön & Yannik Bopp (SAP Concur) Recorded: Jun 11 2019 24 mins
    Dank präziser Daten unnötige Mehrausgaben vermeiden: Erfahren Sie in dieser Webinar-Aufzeichnung, wie Sie mit der optionalen Budget Lösung von SAP Concur Ihre Reiseausgaben nahezu in Echtzeit dargestellt bekommen und in jeder Situation die Kontrolle über alle Kosten behalten.
  • Innovate faster and boost retail business agility with the Cloud
    Innovate faster and boost retail business agility with the Cloud
    Ismael Ciordia, CTO & Client Success Officer at Openbravo Recorded: Jun 11 2019 37 mins
    This webinar will outline the key reasons for retail businesses to adopt cloud-based computing platforms such as Openbravo Commerce Cloud. These include: Greater business agility, lower cost and better integration capabilities.
  • A1-Formular und EU-Entsenderichtlinie: Was ist Pflicht, was ist Kür?
    A1-Formular und EU-Entsenderichtlinie: Was ist Pflicht, was ist Kür?
    Claudia Kühne (Ernst & Young) & Andreas Klein (SAP Concur) Recorded: Jun 7 2019 65 mins
    Erfahren Sie in dieser Webinar-Aufzeichnung, wie Sie mit SAP Concur und EY alle Vorgaben einhalten.

    In diesem Webinar haben unsere Experten von EY und SAP Concur ausführlich alles erklärt, was Sie über das A1-Formular und die Entsenderichtlinie wissen müssen und welche Verpflichtungen Sie erfüllen müssen.
  • SAP Travel Management On-Premise und SAP Concur – Teil 2
    SAP Travel Management On-Premise und SAP Concur – Teil 2
    Pia Lübeck & Isabelle Paul (SAP SE), Manu Kozhuppankutty (SAP Concur) Recorded: Jun 7 2019 51 mins
    Die Geschäftsreisemanagement-Tools SAP Travel Management On-Premise und SAP Concur: Was unterscheidet sie? Welches ist heute und in Zukunft die beste Lösung für Ihr Unternehmen? Und was kommt bei einem Wechsel von der On-Premise Lösung in die Cloud auf Sie zu? In diesem Webinar geht es um:

    - Unterschiede in der Implementierung
    - Unterschiede in der Wartung und Anpassungen im laufenden Betrieb
    - Integration von SAP Concur in andere SAP Systeme

    Sie wollen zu Travel & Expense Management auf dem Laufenden bleiben? Dann registrieren Sie sich jetzt für den News-Service von SAP Concur: https://bit.ly/2GZRZba
  • You're Vulnerable because Patch Management is Broken
    You're Vulnerable because Patch Management is Broken
    Gary Paquette General Manager, Technology Asset Management Nlyte Software Recorded: Jun 6 2019 28 mins
    Learn how Nlyte for Microsoft SCCM ensures delivery and installation to bolster patch security

    - Validate SCCM agent is installed, configured, and operational
    - Query platforms not accessible by SCCM
    - Reconcile systems to correct cost centers and departments
    - Eliminate False positives

    Nlyte Asset Explorer uses agentless technology to scan your network from desktop to data center to cloud, creating an inventory of your hardware, software and networking assets. It supports all major protocols, integrates with your CMDB and creates a single source of knowledge of 100’s of data points.

    We look forward to seeing you there.
  • SAP Travel Management On-Premise und SAP Concur – Teil 1
    SAP Travel Management On-Premise und SAP Concur – Teil 1
    Pia Lübeck (Director, Global SAP Concur CoE, SAP SE), Jochen Neubauer (Customer Value Sales, SAP Concur) Recorded: Jun 6 2019 55 mins
    Die Geschäftsreisemanagement-Tools SAP Travel Management On-Premise und SAP Concur: Was unterscheidet sie? Welches ist heute und in Zukunft die beste Lösung für Ihr Unternehmen? Und was kommt bei einem Wechsel von der On-Premise Lösung in die Cloud auf Sie zu? In diesem Teil 1 der Serie "Strategie und Funktionen" geht es um:

    - Die Rolle der Lösungen in SAPs Intelligent Enterprise Strategie
    - SAP Concur und die Rolle innerhalb des SAP-Portfolios
    - Wesentliche Unterschiede beider Lösungen & Vorteile eines Wechsels

    Im zweiten Teil geht es um die technischeren Aspekten eines Wechsels: Ansätze zur Implementierung und Wartung beider Lösungen sowie der aktuelle Stand der Integration von SAP Concur in andere SAP Systeme.

    Sie wollen zu Travel & Expense Management auf dem Laufenden bleiben? Dann registrieren Sie sich jetzt für den News-Service von SAP Concur: https://bit.ly/2GZRZba
  • Vulnerabilities in Containerised Production Environments
    Vulnerabilities in Containerised Production Environments
    Tim Mackey, Senior Technical Evangelist, Synopsys Recorded: Jun 6 2019 59 mins
    With each new technology cycle, we seek to improve both business efficiency and security. Unfortunately, our legacy practices can severely hold us back from achieving the full potential of our new technology stack. When this occurs, organisations with the most valuable data come under attack first.
  • You're Vulnerable because Patch Management is Broken
    You're Vulnerable because Patch Management is Broken
    Gary Paquette General Manager, Technology Asset Management Nlyte Software Recorded: Jun 6 2019 28 mins
    Learn how Nlyte for Microsoft SCCM ensures delivery and installation to bolster patch security

    - Validate SCCM agent is installed, configured, and operational
    - Query platforms not accessible by SCCM
    - Reconcile systems to correct cost centers and departments
    - Eliminate False positives

    Nlyte Asset Explorer uses agentless technology to scan your network from desktop to data center to cloud, creating an inventory of your hardware, software and networking assets. It supports all major protocols, integrates with your CMDB and creates a single source of knowledge of 100’s of data points.

    We look forward to seeing you there.
  • Invoice Audit with AI: 15 1/2 Real World Use Cases
    Invoice Audit with AI: 15 1/2 Real World Use Cases
    David Wishinsky, Sr. Product Marketing Manager, AppZen Recorded: Jun 5 2019 43 mins
    Invoicing and payments problems can take a variety of forms: fraudulent invoices, invoices that don't represent negotiated terms, or just plain duplicates.

    As your business grows and your vendor list gets larger, how do you stay on top of the validity of each invoice?

    Join David Wishinsky, Sr. Product Marketing Manager at AppZen, as he reveals 15 critical invoice audit and contract compliance use cases that AI makes possible.

    Register to learn how AI can help you to
    - Reduce spend by proactively finding invoice errors and fraud
    - Comply with regulations
    - Stay ahead of auto-renewals and early discount opportunities
  • Reisekostenmanagement im intelligenten Unternehmen
    Reisekostenmanagement im intelligenten Unternehmen
    Jens Schneider (Director Product Marketing, SAP Concur), Benjamin Tattermusch (Regional Sales Executive, SAP Concur) Recorded: Jun 5 2019 22 mins
    Von der Vision eines integrierten Ausgabenmanagements zur gelebten Plattform mit einem digitalen Ökosystem: Erleben Sie die Vorteile einer Ausgabenmanagement-Lösung in einem intelligenten Unternehmen. Erfahren Sie, wie Sie Silos zwischen Ihrer Finanz-, IT- und Einkaufsabteilung beseitigen und Ihre Prozesse optimieren können. Verschaffen Sie sich noch mehr Kontrolle über Ihre Ausgaben.

    Sie wollen zu Travel & Expense Management auf dem Laufenden bleiben? Dann registrieren Sie sich jetzt für den News-Service von SAP Concur: https://bit.ly/2GZRZba
  • Five ways the G2000 is Building Security and Trust
    Five ways the G2000 is Building Security and Trust
    Ravi Das, Cyber Security News and Ann-Marie (Punky) Witt, Synack Recorded: Jun 4 2019 29 mins
    We asked CISOs from the Global 2000, government agencies, and high-growth companies about their 2019 priorities. Across the board, they answered: effective, efficient security that is grounded in trust.

    In this new webinar Cyber Security News’ Ravi Das dives deep into the 2019 Trust Report findings with Synack’s Director of Product Marketing, Anne-Marie (Punky) Witt. In this webinar, Ravi and Punky discuss the key findings from the report, including:
    - The 2019 list of most secure and trusted industries
    - Average security performance over time (and the impact on trust scores)
    - The ROI of a continuous, integrated approach to security
    - Trends in severity of vulnerability findings and remediation
    - The 5 things that successful organizations are doing to build security and trust
  • Das Geheimnis erfolgreicher Unternehmen. Wie man Daten richtig nutzt.
    Das Geheimnis erfolgreicher Unternehmen. Wie man Daten richtig nutzt.
    Oliver Sehon (Director Analytics Integation, SAP) und Jochen Alig (Solution Consultant Senior, SAP Concur) Recorded: Jun 4 2019 41 mins
    Nur wer seine (Geschäftsreise-)Daten kennt, kann sie erfolgreich einsetzen. Erleben Sie anhand des Digital Boardrooms, welche Möglichkeiten die Integration von SAP Concur in die SAP Analytics Cloud bringt.

    Daten aus dem Geschäftsreisemanagement berühren viele Abteilungen:

    - Finanzverantwortliche, die sich volle Transparenz über Kosten und eine verlässliche Datengrundlage für Investitionsentscheidungen wünschen.

    - Travel Manager, die wissen wollen, wie Mitarbeiter reisen, um in Verhandlungen mit Anbietern das Maximum herauszuholen.

    - HR-Experten, für die es wichtig ist, die (Reise-)Gewohnheiten Ihrer Mitarbeiter zu kennen, um so in der Lage zu sein, deren Zufriedenheit zu erhöhen.
  • Delivering Digital Client Onboarding For Better Client Experience
    Delivering Digital Client Onboarding For Better Client Experience
    Conor Coughlan, James Follette, Rachel Woolley, Jonathan Jones, Philippe Guiral Recorded: May 31 2019 61 mins
    In this webinar, Fenergo and Accenture join forces to present a target operating model for how commercial and business banks can design their digital client journeys from end-to-end to deliver a better client experience throughout initial client onboarding and throughout the entire client lifecycle.

    In this webinar, you'll learn:

    - The top trends in digital transformation and client experience
    - Expected regulatory changes in 2019/2020 impacting Client Lifecycle Management
    - Target Operating Model: How to design and implement a frictionless, straight through
    client journey from initial onboarding to ongoing lifecycle management, including the
    key digital technologies that will make this happen e.g. eSignatures, digital ID&V,
    biometrics etc.
    - Live Demo: What a digital, well-orchestrated and connected Client Onboarding &
    Lifecycle process looks like
  • Next Generation Discovery for ServiceNow
    Next Generation Discovery for ServiceNow
    Mark Gaydos, CMO, at Nlyte Software Recorded: May 30 2019 20 mins
    Shouldn’t your CMDB be Your Trusted Source of Truth? Is it really?

    In this webinar you will learn:

    - How Next Generation Discovery improves your ServiceNow CMDB data accuracy
    - How you can cost effectively automate the discovery and reconciliation across your entire compute infrastructure
    - How to increase efficiency by up to 20%
    - Find assets you weren’t aware were on your network
    - Significantly reduces the time it takes you to perform audits

    Join this webinar where Mark Gaydos, CMO of Nlyte Software, will present the Next Generation Discovery - It is about what you don't know.
  • Next Generation Discovery for ServiceNow
    Next Generation Discovery for ServiceNow
    Mark Gaydos, CMO, at Nlyte Software Recorded: May 30 2019 20 mins
    Shouldn’t your CMDB be Your Trusted Source of Truth? Is it really?

    In this webinar you will learn:

    - How Next Generation Discovery improves your ServiceNow CMDB data accuracy
    - How you can cost effectively automate the discovery and reconciliation across your entire compute infrastructure
    - How to increase efficiency by up to 20%
    - Find assets you weren’t aware were on your network
    - Significantly reduces the time it takes you to perform audits

    Join this webinar where Mark Gaydos, CMO of Nlyte Software, will present the Next Generation Discovery - It is about what you don't know.
  • Global Supply Chain Risk Report: Insights and Findings from Q1 2019
    Global Supply Chain Risk Report: Insights and Findings from Q1 2019
    Dr Heather Skipworth and Dr Emel Aktas, Cranfield School of Management Jun 19 2019 12:30 pm UTC 30 mins
    Join this webinar, led by experts from Cranfield School of Management to hear the results of the Q1 2019 Global Supply Chain Risk Report.

    The Global Supply Chain Risk Report is a joint study by Cranfield School of Management’s Centre for Logistics and Supply Chain Management and Dun & Bradstreet, which investigates the level of supply chain risk faced by European companies with international supplier relationships.

    Analysis has been carried out using data supplied by Dun & Bradstreet, which included around 200,000 anonymous transactions between European buyers and their suppliers who were located in more than 150 countries worldwide.

    During the webinar, we will focus on the Q1 2019 report, published in June 2019. We will cover the background, the key findings and practical implications for procurement professionals.

    Register now to learn:

    - The level of supply risk in Q1 2019
    - The differences across key industry sectors and how this should be considered in procurement decisions
    - How dependency on key suppliers changed compares with the previous quarter

    Presented by Dr Heather Skipworth and Dr Emel Aktas, Cranfield School of Management
  • Mehrwertsteuer-Rückerstattung leicht gemacht - Mit SAP Concur & seinen Partnern
    Mehrwertsteuer-Rückerstattung leicht gemacht - Mit SAP Concur & seinen Partnern
    Benjamin Tattermusch (Regional Sales Executive, SAP Concur) Jun 19 2019 2:00 pm UTC 35 mins
    SAP Concur App-Center Partner VATBox und Kunde Lonza zeigen, welche Vorteile die Integration von VATBox und SAP Concur hat und wie effektiv die Mehrwertsteuer-Rückerstattung von Geschäftsreisen damit ist.

    Sie wollen zu Travel & Expense Management auf dem Laufenden bleiben? Dann registrieren Sie sich jetzt für den News-Service von SAP Concur: https://bit.ly/2GZRZba
  • Take Control of Your Travel & Expense Spend with AI and AppZen
    Take Control of Your Travel & Expense Spend with AI and AppZen
    Travis Andrade, Sr. Product Marketing Manager, AppZen Jun 19 2019 6:00 pm UTC 60 mins
    Travis Andrade, Sr. Product Marketing Manager at AppZen, gives a high-level overview of how AppZen audits every dollar of company spend with AI and showcases the capabilities and key features of our Expense Audit Platform.

    Attend this webinar to learn how to
    -Reach 100% audit spend
    -Proactively enforce policy
    -Get employees paid faster
  • 7 Pitfalls of TAM
    7 Pitfalls of TAM
    Nlyte Jun 20 2019 8:00 am UTC 60 mins
    Do you know what are the 7 Pitfalls of managing technology assets? Attend this webinar to learn how to improve your ITAM.

    Join this webinar to learn how to avoid the 7 Pitfalls of technology management and reduce costs and improve security across all your assets.

    1. Learn how next generation technology management is reducing costs
    2. Find assets you didn’t know were on your network
    3. Reduce risk and costs from rogue software users
  • 7 Pitfalls of TAM
    7 Pitfalls of TAM
    Nlyte Jun 20 2019 3:00 pm UTC 60 mins
    Do you know what are the 7 Pitfalls of managing technology assets? Attend this webinar to learn how to improve your ITAM.

    Join this webinar to learn how to avoid the 7 Pitfalls of technology management and reduce costs and improve security across all your assets.

    1. Learn how next generation technology management is reducing costs
    2. Find assets you didn’t know were on your network
    3. Reduce risk and costs from rogue software users
  • Learning from Fraud Detection: Segmenting AML to Fight Financial Crime
    Learning from Fraud Detection: Segmenting AML to Fight Financial Crime
    Brendan Brothers Jun 20 2019 5:00 pm UTC 60 mins
    (ACAMS Webinar Rebroadcast)

    Why do we think about AML as a single idea, when fraud is segmented specifically by customer, channel or loss type? In this insightful session, Jim Richards and Brendan Brothers discuss the limitations of the current one-size-fits-all approach to compliance and anti-money laundering. Learn why segmentation is effective at fighting fraud, and how these lessons can be applied to transform the AML industry.

    Learning Objectives
    - Review of the limitations of current AML approaches and technologies to -effectively fight financial crime
    - Understand how segmentation improves fraud detection and how these lessons can be applied to strengthen anti-money laundering efforts
    - Learn how innovative technologies and customer segmentation will transform the AML industry

    (No CAMS credits will be issued for this event.)
  • Cyber Risk Assessment and Quantification - Understand, Measure, Manage
    Cyber Risk Assessment and Quantification - Understand, Measure, Manage
    Swabhiman Chhotray, Managing Consultant, Marsh Risk Consulting Asia, and Naureen Rasul, Cyber Leader, Marsh Asia Jun 25 2019 2:30 am UTC 45 mins
    Every organization has cyber risks. They are difficult to comprehend. They are even harder to assess and quantify.

    An end-to-end cyber risk management approach can be achieved if you:
    1.Understand cyber risks from a business perspective and assess the nature of any potential cyber-related losses – know your threats.
    2.Measure the financial impact of cyber exposures and quantify how much is acceptable across the organization – know yourself.
    3.Manage the insurance and recovery process by having a clear action plan based off your capabilities and capacities – know what you can do.

    Join Marsh Risk Consulting’s, Swabhiman Chhotray and Marsh’s Cyber Leader, Naureen Rasul as they discuss a risk management framework that allows you to understand, measure, and manage your inherent cyber risks.
  • Case Study: How a tier 1 bank transformed its mobile offering with Re:Call
    Case Study: How a tier 1 bank transformed its mobile offering with Re:Call
    Mark Elwood Jun 25 2019 10:00 am UTC 35 mins
    One of the UK’s largest and oldest high street banks is investing over £3 billion to deploy new technology that will make banking simpler and easier for customers and drive operational efficiencies. Improving digital services and creating a digital workplace are central to this transformation.

    Research by networking specialists, Aruba, finds there are clear benefits to being a ‘digital revolutionary’ – an employee who works in a fully-enabled digital workplace – versus a ‘digital laggard’ - those that have less access to workplace technology. These include increased productivity, collaboration and job satisfaction.

    The bank wanted to introduce an alternative to the existing mobile phone offering for better colleague choice, to improve collaboration and increase productivity. They came to TeleWare based on our expertise in mobile communications to specifically help them to:
    •Move from wired to wireless communications technology
    •Support them in adopting modern working practices
    •To provide an alternative to the existing mobile phone offering
    •To provide greater colleague choice

    In this exclusive interview with pivotal TeleWare stakeholders on this project, find out how TeleWare are helping this major bank transform its mobile communications offering for colleagues.

    Audience:
    IT Professionals
    Financial Services professionals
    HR professionals interested in employee engagement

    What you’ll take away:
    Unique insight into how a tier 1 bank is using Re:Call to improve employee engagement and mobility can have positive impacts on your bottom line.
    Hosted by Mark Elwood, Marketing Director, TeleWare
    Nick Reaks, Sales and Customer Director, TeleWare
    Alan Clarke, Technical Project Lead, TeleWare
  • So integrieren Sie Ihre Reisekosten einfach in Ihr ERP
    So integrieren Sie Ihre Reisekosten einfach in Ihr ERP
    Benjamin Tattermusch (SAP Concur), Armin Friemelt (Integration Expert, Platinum Engineering Concur, SAP) Jun 25 2019 2:00 pm UTC 37 mins
    Die Integration der Reisekosten in das Finanzsystem ist wichtig für die Transparenz. Erfahren Sie in diesem Webinar alles über das einmalige Aufsetzen der Integration von SAP Concur in das SAP ERP in vier einfachen Schritten (Live Demo), und den sicheren, automatisierten Datentransfer zwischen Concur und SAP.

    Sie wollen zu Travel & Expense Management auf dem Laufenden bleiben? Dann registrieren Sie sich jetzt für den News-Service von SAP Concur: https://bit.ly/2GZRZba
  • Security+ Objective 1.2
    Security+ Objective 1.2
    Donald E Hester & Robert DeRoeck Jun 25 2019 5:00 pm UTC 150 mins
    In this webinar we are going to cover CompTIA’s SY0-501 Security+ certification exam objective 1.2: Compare and contrast types of attacks.

    Social Engineering attacks:
    - Phishing
    - Spear phishing
    - Whaling
    - Vishing
    - Tailgating
    - Impersonation
    - Dumpster diving
    - Shoulder surfing
    - Hoax
    - Watering hole attack

    Application/service attacks:
    - DoS
    - DDoS
    - Man-in-the-middle
    - Buffer overflow
    - Injection
    - Cross-site scripting
    - Cross-site request forgery
    - Privilege escalation
    - ARP poisoning
    - Amplification
    - DNS poisoning
    - Domain hijacking
    - Man-in-the-browser
    - Zero day
    - Replay
    - Pass the hash
    - Hijacking and related attacks
    - Clickjacking
    - Session hijacking
    - URL hijacking
    - Typo squatting
    - Driver manipulation
    - Shimming
    - Refactoring
    - MAC spoofing
    - IP spoofing

    Wireless attacks:
    - Replay
    - IV
    - Evil twin
    - Rogue AP
    - Jamming
    - WPS
    - Bluejacking
    - Bluesnarfing
    - RFID
    - NFC
    - Disassociation

    Cryptographic attacks:
    - Birthday
    - Known plain text/cipher text
    - Rainbow tables
    - Dictionary
    - Brute force
    - Online vs. offline
    - Collision
    - Downgrade
    - Replay
    - Weak implementations
  • Developers are your greatest AppSec Resource – Here’s How to Activate Them
    Developers are your greatest AppSec Resource – Here’s How to Activate Them
    Amy DeMartine, Forrester Principal Analyst and Utsav Sanghani, Senior Product Manager, Synopsys Jun 25 2019 6:00 pm UTC 50 mins
    Application vulnerabilities are a prime target for attackers, and the critical task of identifying and remediating these flaws before they’re exploited can be daunting, especially for organizations adopting DevOps and CI/CD practices. Security teams don’t have the time or resources to find and fix every vulnerability, and developers prefer to do what they do best – build and deploy features quickly. Fortunately, developers can be good at their jobs and be your most effective application security resources if you enable them with the low-friction tools and training at the precise time they need them.

    Join guest speaker Amy DeMartine, principal analyst at Forrester Research, and Utsav Sanghani, senior product manager at Synopsys, as they explore tools and techniques that can transform your developers into AppSec rock stars:
    - Rapid and continuous in-IDE security testing can help your developers find and fix issues before they ever get committed to your codebase.
    - Delivering short, contextualized AppSec training modules to developers in real time when they introduce vulnerabilities.
    - Most modern applications contain more open source code than proprietary code. Help your developers identify and avoid risky OSS components.
  • 6 Surprises Found in Your Invoices by AI Auditing
    6 Surprises Found in Your Invoices by AI Auditing
    Charlie Warne Jun 26 2019 11:00 am UTC 29 mins
    Accounts payable departments at large enterprises pay thousands of invoices each month. With such a large volume of invoices, companies leave themselves at risk for overpayment and potential invoice fraud.

    As your business grows and your vendor list gets larger, how do you stay on top of the validity of each invoice?

    Join Charlie Warne, Sr. Solutions Consultant at AppZen, as he explains how auditing invoices with AI helps you to:
    - Protect your business from liability
    - Avoid PR nightmares
    - Stay compliant
  • Why Your Vendors Are Your Biggest HIPAA Privacy Risk
    Why Your Vendors Are Your Biggest HIPAA Privacy Risk
    Kathleen Randall, EVP North America CISSP, CISA, GSNA and Ben Dalton, Senior Technical Consultant Jun 26 2019 4:00 pm UTC 60 mins
    In the past, healthcare organizations have paid lip service to HIPAA’s privacy requirements for third party vendors, or “business associates.” As data breaches and malware continue to cripple healthcare institutions, many are realizing that their weakest links may be out of their control and in their vendor’s hands. How can you be assured that your ePHI data is in safe hands? By asking the right questions. Industries like finance, insurance, energy have managed third party risk programs for years. In this webinar learn how industry best practices can be incorporated to not only meet HIPAA requirements but also give visibility to manage your external risk to your healthcare organization.

    The session will cover:
    • Managing the risk of your Business Associates (and the risk of their Business Associates)
    • Case Studies: Vendors as a common source of breaches
    • Before you sign off on the Business Associate Agreement, what you should be doing?
    • Work smarter, not harder: How to drive a cost-effective and OCR-compliant process.
  • Conquering the Biggest eDiscovery Challenges Facing Plaintiff’s Attorneys
    Conquering the Biggest eDiscovery Challenges Facing Plaintiff’s Attorneys
    Doug Austin and Tom O'Connor Jun 26 2019 5:00 pm UTC 90 mins
    It seems as though the eDiscovery deck is stacked against plaintiff’s attorneys. Defendants seem to have all the resources, the technical know-how and the interest of the major eDiscovery vendors while the plaintiffs often have few resources, technical knowledge or eDiscovery experience. How do plaintiff’s attorneys bridge that gap? This CLE-approved* webcast session will discuss the biggest eDiscovery challenges facing plaintiff’s attorneys and provide best practices for addressing those challenges to give plaintiff’s attorneys the best chance t get the evidence they need for their case. Topics include:

    + Biggest eDiscovery Challenges Facing Plaintiff’s Attorneys
    + Ethical Duties and Rules for Understanding Technology
    + Does the eDiscovery Market Care About Plaintiff's Attorneys?
    + Understanding the Fundamentals of eDiscovery
    + Your Clients May Have More ESI Than You Think
    + How to Request the Right Form of Production from Opposing Counsel
    + Mechanisms and Approaches for Getting the Data to Make Your Case
    + What You Need to Know About Technology Assisted Review
    + Resources You Need to Bridge Your Understanding Gap

    Presentation Leaders:

    Doug Austin is the Vice President of Products and Services for CloudNine. Doug has over 30 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients. Doug is also the editor of the CloudNine sponsored eDiscovery Daily blog, which is a trusted resource for eDiscovery news and analysis, and has received a JD Supra Readers Choice Award as the Top eDiscovery Author for three consecutive years .

    Tom O’Connor is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems. Tom’s consulting experience is primarily in complex litigation matters.
  • Concur in Aktion - Travel & Expense, ein integrierter Ansatz
    Concur in Aktion - Travel & Expense, ein integrierter Ansatz
    Yannik Bopp (Market Development Representative) & Severin Schoen (Solution Consultant), SAP Concur Jun 27 2019 2:00 pm UTC 25 mins
    Erhalten Sie einen Überblick zur Komplettlösung von SAP Concur für die Buchung und Abrechnung von Geschäftsreisen.

    Es geht darum,
    - wie einfach es ist, eine Geschäftsreise mit Concur zu buchen und wie sich Ihre Geschäftsreiseabrechnung selbst schreibt,
    - wie Sie als Manager einen unmittelbaren Überblick über die Buchungen Ihrer Mitarbeiter haben und nachvollziehen können, ob sie die Reiserichtlinien befolgen
    und
    - wie Ihre Geschäftsreisenden Reisekosten mit ExpenseIt mühelos erfassen und automatisch richtig aufschlüsseln.

    Sie wollen zu Travel & Expense Management auf dem Laufenden bleiben? Dann registrieren Sie sich jetzt für den News-Service von SAP Concur: https://bit.ly/2GZRZba
  • Streamlining Your Tech Due Diligence Process for Software Assets
    Streamlining Your Tech Due Diligence Process for Software Assets
    Tim Mackey, Principle Security Strategist, Synopsys Cybersecurity Research Center Jun 27 2019 4:00 pm UTC 60 mins
    Open source, legal, compliance, security, and code quality risks all come into play when you’re acquiring a company where the technology is a large part of the deal valuation. And if you’re making multiple acquisitions a year, how do you ensure that your tech due diligence process addresses each of these potential risks, all while moving at the speed of the deal?

    Join us for this webinar to learn how you can streamline your tech due diligence process without sacrificing quality assessments. We’ll cover:

    • Understanding open source, its license obligations, and its security vulnerabilities
    • Testing the overall security of code assets, including proprietary code
    • Understanding potential points of data leakage via third-party web API integrations
    • Steps for creating a repeatable software asset audit process

    Don’t miss this informative webinar. Register today.
  • SkyStem: Back to Basics with Reconciliations
    SkyStem: Back to Basics with Reconciliations
    Nancy Wu, Sales and Customer Support, SkyStem Jun 27 2019 6:00 pm UTC 59 mins
    [Live Recording] It's time to show some love for the workhorse of the financial close process -- balance sheet account reconciliations! Join us in this webinar, where we share best practices on how to think about the reconciliation work each month, when best to do reconciliations, how they should be prepared, and some common pitfalls to avoid.

    Please note: CPE credit not available for this playback.
  • Scaling CIAM - A Guide for worldwide Success
    Scaling CIAM - A Guide for worldwide Success
    Dr. Heiko Klarl Jul 1 2019 3:00 pm UTC 60 mins
    Digital transformation, worldwide new digital business models and technological trends such as artificial intelligence will revolutionise customer relationships. It will be essential to personalise communication with customers around the world and to always address them in the right context. The basis for this is integrated customer data management, which enables new sales potentials and improves the customer experience.

    In this webinar you will learn:
    More about the strategic challenges associated with implementing customer data management solutions and how to address them: From time-to-market requirements to international rollouts from America to China all the way to supporting new services in mergers & acquisitions.
  • Current Cyber Scams & Need for Awareness
    Current Cyber Scams & Need for Awareness
    Donald E Hester Jul 2 2019 5:00 pm UTC 90 mins
    A repeat presentation given at Maze Live 2019. In this session we will cover some of the most popular scams we see for local governments and businesses. We will cover the potential impact of successful scams on organizations. We will also cover how to setup a cybersecurity awareness program and some tips and tricks for maturing your awareness efforts.
  • SkyStem: Seducing the Auditors with Internal Controls
    SkyStem: Seducing the Auditors with Internal Controls
    Nancy Wu, Sales and Customer Support, SkyStem Jul 2 2019 6:00 pm UTC 57 mins
    With the auditors approaching (or maybe they just never left), the accounting team needs to put its best foot (and documentation) forward in order to avoid a long and drawn out affair with the auditors. Join us in this webinar, where we share the best ways to build and maintain your internal controls infrastructure to impress your auditors and make the year-end audit as quick and painless as can be.

    Please note: CPE credit not available for this playback.
  • Operating Off-the-shelf IAM with a DevOps methodology
    Operating Off-the-shelf IAM with a DevOps methodology
    Tim Hobbs, DevOps Evangelist, iC Consult Group Jul 3 2019 3:00 pm UTC 60 mins
    IAM products are highly configurable systems tailored to the diverse needs of customer environments and applications. Modern applications require short development cycles and IAM systems that can be adjusted at the same pace. Modern data centers are configuration-driven, resilient environments designed to meet rapidly changing application needs, and modern IAM solutions must be in line with this paradigm.
    Introducing traditional IAM products into cloud containers is not a simple "lift and shift" operation, as it once was with the virtual machine infrastructure. Today's micro-service-enabled, service-mesh-oriented infrastructure expects simple, resilient, self-discovery services instead of brittle monoliths that rely on manual configuration.
    Operating IAM products with a DevOps setting in terms of automation, repeatability, and continuous improvement is possible through close collaboration between IAM, application, and infrastructure experts.
  • SkyStem: Overview of the SEC's Whistleblower Program
    SkyStem: Overview of the SEC's Whistleblower Program
    Nancy Wu, Sales and Customer Support, SkyStem Jul 9 2019 6:00 pm UTC 57 mins
    [Live Recording] Join us for an overview of the SEC's Whistleblower Program. Learn about how the program is set up, the extent of damages awarded to date, and the resulting benefits the program has produced for our society at large.

    Please note: CPE credit not available for this playback
  • Kundenbeispiel: Von Insellösungen zum harmonisierten Reisekostenmanagement
    Kundenbeispiel: Von Insellösungen zum harmonisierten Reisekostenmanagement
    Adrian Gagala (Lead Digital Employee Solutions, Group IT) & Benjamin Tattermusch (SAP Concur) Jul 10 2019 2:00 pm UTC 30 mins
    dormakaba gibt Einblicke in seinen Geschäftsreiseprozess: Erfahren Sie, wie ein SAP Concur Kunde aus Insellösungen einen einheitlichen End-to-End-Prozess gemacht hat und welche Vorteile die App Center und TripLink Partnerschaft in der Praxis bringt.
  • Chop Suey mit Pommes - CIAM von Amerika bis China
    Chop Suey mit Pommes - CIAM von Amerika bis China
    Dr. Heiko Klarl, CMO, iC Consult Group und Dietmar Kenzle, RSD DACH & EE, Ping Identity Jul 15 2019 2:00 pm UTC 60 mins
    Die digitale Transformation, weltweite neue digitale Geschäftsmodelle und technologische Trends wie künstliche Intelligenz werden die Kundenbeziehungen revolutionieren. Es wird unabdingbar, die Kommunikation mit dem Kunden weltweit zu personalisieren und ihn stets im richtigen Kontext anzusprechen. Basis dafür ist ein integriertes Kundendatenmanagement, das neue Vertriebspotenziale erschließt und das Kundenerlebnis verbessert.

    In diesem Webinar erfahren Sie:
    Mehr über die strategischen Herausforderungen, die mit der Einführung von Customer Data Management-Lösungen einhergehen, und wie diese angegangen werden können: Von Time-to-Market-Anforderungen über den internationalen Rollout von Amerika bis China bis hin zur Unterstützung neuer Services bei Fusionen & Übernahmen.
  • SkyStem: Spooky Tales from the SEC
    SkyStem: Spooky Tales from the SEC
    Nancy Wu, Sales and Customer Support, SkyStem Jul 18 2019 6:00 pm UTC 56 mins
    [Live Recording] Join us in this webinar, where we arm ourselves with knowledge that can help our organization deter and detect organizational fraud. Learn the most common fraud practices, the best fraud detection and prevention activities, as well as recent SEC fraud cases.

    Please note: CPE credit not available for this playback