Hi [[ session.user.profile.firstName ]]

Audit and Compliance

  • Top Considerations for Software Audits in M&A Due Diligence
    Top Considerations for Software Audits in M&A Due Diligence
    Phil Odence, Synopsys Recorded: Mar 21 2019 61 mins
    There is risk in any M&A transaction but having the right tech due diligence approach can help mitigate that risk. If software is a large part of the deal valuation, you need to understand any potential legal and security risks in the target’s codebase that could affect the value of the IP, and the remediation required to address those risks.

    Join Phil Odence, General Manager of Black Duck On-Demand with Synopsys, to take a closer look at how you can identify and reduce risks in M&A tech due diligence. He’ll cover the following points and more:

    • Uncovering application risks: What’s in the code
    • Taking a comprehensive approach to security audits
    • Choosing the right partner for audits

    Don’t miss this informational webinar. Register today!
  • Configuration Compliance Management for 2020 and Beyond
    Configuration Compliance Management for 2020 and Beyond
    Sam Abadir, Lockpath Recorded: Mar 20 2019 40 mins
    Planning and managing for hardened, secure assets is a key requirement for managing IT Risk and is mandated by many compliance sources such as PCI, NIST, FISMA and HIPAA – yet many organizations are not fully assessing their IT hosts and applications for secure configuration. In this live webinar, Lockpath’s Sam Abadir will share what configuration compliance management for 2020 and beyond looks like, including:

    •What configuration compliance management encompasses
    •Who should care about secure configuration management
    •Why organizations are not doing this today and how this impacts the business beyond IT


    Discover the future for configuration compliance management by attending this educational webinar. Register now!
  • SkyStem: Seducing the Auditors with Internal Controls
    SkyStem: Seducing the Auditors with Internal Controls
    Nancy Wu, Sales and Customer Support, SkyStem Recorded: Mar 19 2019 57 mins
    With the auditors approaching (or maybe they just never left), the accounting team needs to put its best foot (and documentation) forward in order to avoid a long and drawn out affair with the auditors. Join us in this webinar, where we share the best ways to build and maintain your internal controls infrastructure to impress your auditors and make the year-end audit as quick and painless as can be.

    Please note: CPE credit not available for this playback.
  • 7 Reasons Asset Compliance Blows-up
    7 Reasons Asset Compliance Blows-up
    Mark Gaydos, CMO, at Nlyte Recorded: Mar 19 2019 29 mins
    Join this webinar where Mark Gaydos, CMO of Nlyte Software, will present the Next Generation Asset Discovery - it is about what you don't know!

    In the 30 minutes you are watching this, find out:

    - What happens when compliance goes wrong
    - What you weren't worrying about that you should
    - How 7 best practices and a little technology can reduce your chance of a panic attack

    Nlyte Asset Explorer uses agentless technology to scan your network from desktop to data center to cloud, creating an inventory of your hardware, software and networking assets. It supports all major protocols, integrates with your CMDB and creates a single source of knowledge of 100’s of data points.

    We look forward to seeing you there.
  • Balancing Cybersecurity Risk for the State of Arizona
    Balancing Cybersecurity Risk for the State of Arizona
    Morgan Reed and John Dasher Recorded: Mar 19 2019 58 mins
    In this webinar, we’re joined by Morgan Reed, Chief Information Officer for the State of Arizona. Morgan’s extensive experience in both private enterprise and the public sector puts him in a unique position to help us understand and benefit from how cybersecurity risk is being measured and controlled at the State of Arizona. We’ll discuss relevant cybersecurity risk topics, including his environment, how he views and communicates cybersecurity risk, some frameworks, and how you can go about applying his experience to your own environment, regardless of sector or vertical industry.
  • What do you get when you cross a CEO and a CISO’s strategy
    What do you get when you cross a CEO and a CISO’s strategy
    Mark Chaplin, Principal, ISF Recorded: Mar 19 2019 45 mins
    While the board ‘get cyber’, questions remain around embedding cyber risk management into business strategy execution. For many CISOs, strategy alignment represents the best opportunity to engage with the board and ensure a business-driven approach to managing cyber risk.

    So how should business leaders develop, update and execute business strategy with so many cyber-related implications? How can organisations meet their business goals, against a backdrop of increasing cybersecurity costs, greater regulatory scrutiny and increased frequency and magnitude of data breaches?

    In this webinar, Mark Chaplin, Principal, ISF will discuss the significance of aligning security strategy with business strategy. Mark will draw on executive engagement, exploring the essential factors for success and highlighting the pitfalls to avoid.
  • Why Brexit will hurt productivity in Financial Services the most...
    Why Brexit will hurt productivity in Financial Services the most...
    Mark Elwood - Marketing Director, TeleWare Recorded: Mar 19 2019 44 mins
    ... and the technologies that will prevent it.

    Join this webinar to hear how technology is creating a mobility-enabled workforce to increase productivity in financial services and the lessons other sectors can learn.

    In the words of Nobel Laureate Paul Krugman ‘productivity isn't everything, but in the long run it is almost everything.’

    Creating a modern workforce that has access to the technology that will improve productivity is key to ending the productivity crisis. TeleWare, working with Financial Services clients are helping create a mobile-enabled workforce designed to improve productivity. These lessons can be adopted in many vertical sectors, particularly in a post-GDPR and Brexit world.

    Find out:
    • Why you should be focusing on increasing productivity in your business
    • How enabling your employees to use the latest technology with no cost to your business can improve employee satisfaction and create growth
    • Why mobility is the secret weapon in the fight against stagnant productivity growth
    • Which technologies you should be thinking about to create a mobility-enabled workforce

    Join us for this insightful webinar that explores the technologies firms are adopting to help increase productivity and to beat their competition.
  • LIBOR Transition for Derivatives: A Global Approach
    LIBOR Transition for Derivatives: A Global Approach
    Hogan Lovells partners Evan Koster and James Doyle Recorded: Mar 18 2019 82 mins
    The webinar will update viewers on the status of the LIBOR transition process globally, paying attention to the US, English, Asian, and EU markets. The webinar will summarise the results of the various market consultations, investigate how documentation is being affected, and explore issues relating to harmonisation with loan and other markets.
  • Approaches on Diminishing Synthetic Identity Fraud Cases
    Approaches on Diminishing Synthetic Identity Fraud Cases
    Carmel Maher from ID Analytics, Deshietha Partee-Grier from Duetsche Bank & Sandeep Dhadda from Citigroup Recorded: Mar 15 2019 90 mins
    Carmel Maher, Senior Product Marketing Manager for ID Analytics presented alongside Deshietha Partee-Grier, AVP Financial Crime Investigations Unit and Sandeep Dhadda, Director, Head of Advanced Analytics for CitiGroup bring the audience to a road beyond the basics of Synthetic Identity Fraud and as they delve into the depth-analysis of mitigating the risks of fraudulent activities through various anti-fraud measures.

    The prevalence of fraud in the marketplace has remained to be one of the most challenging threats that most businesses face nowadays. Thus, urging companies to stay ahead of the latest fraud-detection measures and technologies to prevent the proliferation of such activities. Among the most pervasive types of identity fraud is Synthetic Identity Fraud which may have accounted for 5% of uncollected debt and up to 20% of credit losses in the past years.

    Concurrent with the evolving sophisticated fraud tactics, it becomes more important for businesses and organizations to keep themselves abreast of the various strategies and Anti-Fraud measures that will help diminish and significantly slow down the proliferation of Synthetic Identity Fraud cases. Companies must stay updated of the latest threats and developments in this rapidly evolving landscape while minimizing consequences for consumers.

    Join a panel of key thought leaders assembled by The Knowledge Group as they bring the audience to a road beyond the basics of Synthetic Identity Fraud and as they delve into the depth-analysis of mitigating the risks of fraudulent activities through various anti-fraud measures. Speakers will also provide the audience with best practices, approaches and preventive measures on diminishing such cases.

    In a webcast, the speakers will discuss:
    - 2019 Synthetic Identity Fraud Landscape – an Overview
    - Different Types of Fraud
    - Detection and Remediation
    - Common Red Flags
    - Risks Mitigation Strategies
    - Addressing Implications
    - What Lies Ahead
  • ISO Compliance
    ISO Compliance
    Lockpath Recorded: Mar 14 2019 3 mins
    ISO compliance can be tedious, labor-intensive and an on-going task of managing processes. Learn how the Keylight Platform is the solution you need for ISO compliance.
  • Breaking Down the PCI SSC’s New Guidance for Protecting Telephone-Based Payments
    Breaking Down the PCI SSC’s New Guidance for Protecting Telephone-Based Payments
    Wayne Murphy, Senior Security Consultant (QSA), Sec-1 Ltd.; Ben Rafferty, Chief Innovation Officer, Semafone Recorded: Mar 14 2019 46 mins
    Over the last seven years, the technologies used by call and contact centers to communicate with customers and complete card transactions have changed drastically. Networking methodologies like VoIP have since become widely adopted, while the number of applications organizations employ to process customer information has risen dramatically. For this reason, the PCI SSC recently released their highly anticipated updated “Guidance for Protecting Telephone-Based Card Payments” for the first time since 2011, offering several much-needed clarifications for organizations looking to achieve PCI DSS compliance inside their contact centers.

    Join Semafone and Sec-1 Ltd. for this insightful webinar into the most pertinent changes, featuring two of the members of the PCI SSC’s Special Interest Group – Ben Rafferty, Chief Innovation Officer at Semafone, and Wayne Murphy, Senior Security Consultant at Sec-1 Ltd. We’ll cover the following:

    • How to avoid scope-creep inside the contact center during PCI DSS compliance
    • How Pause and Resume call recording solutions create more problems than they solve
    • How most 3rd party services are now in scope for PCI DSS compliance
    • How devices that control SIP Redirection are now also in scope
  • Proactively Detect T&E Misuse with AppZen
    Proactively Detect T&E Misuse with AppZen
    Chris Hester Recorded: Mar 13 2019 47 mins
    Chris Hester, Solutions Architect at AppZen, gives a high-level overview of how AppZen audits every dollar of company spend and showcases the capabilities and key features of our Expense Audit Platform.

    Attend this webinar to learn how to
    -Reach 100% audit spend
    -Proactively enforce policy
    -Get employees paid faster
  • SkyStem: Back to Basics with Reconciliations, SkyStem
    SkyStem: Back to Basics with Reconciliations, SkyStem
    Nancy Wu, Sales and Customer Support, SkyStem Recorded: Mar 12 2019 59 mins
    [Live Recording] It's time to show some love for the workhorse of the financial close process -- balance sheet account reconciliations! Join us in this webinar, where we share best practices on how to think about the reconciliation work each month, when best to do reconciliations, how they should be prepared, and some common pitfalls to avoid.

    Please note: CPE credit not available for this playback.
  • From the Open Banking Front Line: Pioneering People & Products
    From the Open Banking Front Line: Pioneering People & Products
    Fractal Labs, Streeva,Yapily, tail and moneyhub Recorded: Mar 11 2019 26 mins
    February's panel of Open Banking Excellence speakers share their stories from the Open Banking front line.

    As early adopters of open banking technology, they have navigated the regulatory and technical terrain to bring to market products that make life easier for banks, businesses and individuals.

    Hear what they have to say about their experiences.

    Please note: There is some minor sound distortion in the first three minutes after which it clears - apologies!
  • EDRM Releases TAR Guidelines
    EDRM Releases TAR Guidelines
    EDRM Recorded: Mar 4 2019 61 mins
    EDRM released a comprehensive set of guidelines that aim to objectively define and explain technology-assisted review for members of the judiciary and the legal profession. In this webinar, we will discuss the drafting and editing process as well as how the Guidelines are being used to develop a TAR protocol or exemplar on when and under what circumstances TAR should be used.

    Meet our Presenters:
    John Rabiej, Deputy Director, Bolch Judicial Institute
    Jim Waldron, Director, EDRM at Duke Law
    Hon. James Francis, Southern District of New York, Ret.
    Tim Opsitnick, Executive Vice President and General Counsel, TCDI
    Matthew Poplawski, Senior e-Discovery Attorney, Winston & Strawn LLP
    Michael Quartararo, Managing Director, eDPM Advisory Services
  • New PCI DSS Guidance: Highlighting the Deficiencies of Pause-and-Resume
    New PCI DSS Guidance: Highlighting the Deficiencies of Pause-and-Resume
    Simon Turner, BT; Ben Rafferty, Semafone Recorded: Feb 28 2019 63 mins
    With the recent release of the PCI SSC's updated guidelines for protecting telephone-based card payments, it has never been clearer that attaining PCI DSS compliance inside the contact center is a complex and onerous task for any organization. For the first time in seven years, the Council has clarified many previously misinterpreted controls required for in PCI DSS compliance, resulting in increased scope (and all its associated risks) for many contact centers

    One major clarification the guidance makes is targeting pause-and-resume call recording solutions and the potential for cardholder data to make its way onto recordings, thus breaching compliance.

    Join Semafone and BT for an insightful webinar where we’ll cover the following:

    - The deficiencies of Pause-and-Resume call recording solutions for PCI DSS compliance
    - The additional onerous controls QSAs will mandate for organizations using this technology
    - A better way to secure your contact center and keep cardholder data off call recordings

    Register now to reserve your space!
  • The Year Ahead in Climate Risk: Views from Market Leaders
    The Year Ahead in Climate Risk: Views from Market Leaders
    James Cameron Recorded: Feb 28 2019 49 mins
    Carbon Conversations with James Cameron: the first place for independent, in-depth, ideologically non-aligned news, views and opinions about sustainable finance and investing from a practitioner's perspective.

    For our first webinar of 2019, we are delighted to speak with Anna Hyrske, Head of Responsible Investment at Ilmarinen, and Carina Lundberg Markow, Head of Strategy, Asset Management and Sustainability at Folksam.

    This is an opportunity for businesses and firms worldwide to get an insight into their future challenges by learning from sustainable investing pioneers in the Nordic market.

    Participants will discuss the issues that are occupying their attention at the moment, as well as anticipating what the coming year may bring.

    A few key questions to be addressed:

    - What can the rest of Europe learn from the market-leading Nordics?
    - What is your outlook for the year ahead? Which are the areas you are focusing on?
    - How can industry leaders meet their commitments with better data and analytics?

    Please send us any questions you have in advance to info@etindex.com. We will also have a live Q&A at the end of the webinar.
  • Leveraging a Risk-Based Approach to Vulnerability Management
    Leveraging a Risk-Based Approach to Vulnerability Management
    Maxine Holt and Jason Farmer Recorded: Feb 27 2019 43 mins
    Hear from security industry expert from Ovum on moving from silos to collaboration across security and IT teams. For years organizations have leveraged traditional Key Performance Indicators (KPIs) to define success in their Vulnerability Management programs. Unfortunately, this often pitts the security team, who drives the assignment of work, against the overloaded operations team, who performs the work, against one another. The transition to a risk-based approach offers many benefits including more effective communications, a shared understanding of priorities, and a unified sense of purpose. These benefits enable security and operations teams to truly work together to improve the effectiveness of your Vulnerability Management program.
  • Ask the Experts – Challenges & Opportunities with Mobile Workforces & UC
    Ask the Experts – Challenges & Opportunities with Mobile Workforces & UC
    Mark Elwood - Marketing Director, TeleWare Recorded: Feb 27 2019 31 mins
    Mobile working is happening in increasing numbers of businesses. The prize is enormous for businesses who get mobile working right in terms of productivity improvements and happier employees. However recent research carried out on behalf of TeleWare highlight several challenges employers and employees face with increasingly mobile workforces.

    So, why aren’t more businesses and employees getting more benefits out of mobile working?

    Join our panel discussion to find out more about these insights and toget all your questions answered live on how to overcome these challenges.

    Topics we plan to cover:
    • The top 3 challenges employees face when working remotely
    • Is GDPR holding you back unnecessarily?
    • Which types of applications, unified communications and collaboration tools are making an impact
    • Why cloud communication technology is crucial to mobility, productivity and connectivity

    As well as sharing exclusive content, there will be opportunities to ask our expert panellists about any burning issues around mobile working beforehand or during the webinar. So, if there is anything you would like to cover, please get in touch.

    Marketing Director, Mark Elwood will host the session and he will be joined by experts:

    • Steve Haworth – TeleWare CEO
    • Nigel Simpson – Sales Manager
  • Open Banking's first days at school...
    Open Banking's first days at school...
    David Head, Carlos Figueredo, Lindsay Whyte and Helen Child Recorded: Feb 25 2019 37 mins
    Panel of speakers from the January 2019 Open Banking Excellence Meet-London Meet-up: Vocalink, Open Vector & Yapily
  • Technology Asset Discovery tools aren’t working. Find out why & fix it.
    Technology Asset Discovery tools aren’t working. Find out why & fix it.
    Mark Gaydos, CMO, at Nlyte Recorded: Feb 21 2019 22 mins
    Join this webinar where Mark Gaydos, CMO of Nlyte Software, will present the Next Generation of Asset Discovery.

    Nlyte Asset Explorer uses agentless technology to scan your network from desktop to data center to cloud to inventory your hardware, software and networking assets. It supports all major protocols, integrates with your CMDB and creates a single source of knowledge of 100’s of data points.

    You will learn:

    - Security Officers report more than 10% of assets on network are undetected
    - Only 10% of IT Operations managers believe that all assets are detectable and monitored
    - 6% of Financial Officers feel they have no risk from a vendor software audit
    - IT Managers report more than 69% of assets not current with software and patches
    - 87% of Organizations believe 10% of assets or more are not in their CMDB
  • IT Risk Management for 2020 and Beyond
    IT Risk Management for 2020 and Beyond
    Sam Abadir, Lockpath Recorded: Feb 21 2019 40 mins
    IT risk is always evolving, and in 2020 you need to be prepared what it may look like. New technologies and expanding trends such as cloud, digital transformation, and IT risk-related tasks being taken on directly by the business means IT risk will increase and potentially have greater impacts on the business without proper collaboration and management. Prepare for IT risk in 2020 and beyond by attending this live webinar led by Lockpath’s Sam Abadir. Topics to be discussed include:

    · Evolution of IT landscapes and what it means to IT risk management

    · IT risk management skillsets and disciplines

    · Collaboration across departments and building consensus

    · How organizational maturity impacts managing IT risk

    · How to sustain growth in 2020 and beyond



    Find out what you need to know to manage IT risk in 2020 and beyond by attending this educational webinar. Register now!
  • Delivering an Effective Cyber Security Exercise: Enhanced Breach Response
    Delivering an Effective Cyber Security Exercise: Enhanced Breach Response
    Daniel Norman, Research Analyst, ISF Recorded: Feb 20 2019 45 mins
    Organisations are constantly under threat with over two-thirds of them experiencing data breaches in 2018. As a result, preparedness and resiliency are paramount to protecting an organisation’s information from cyber attacks.

    Business leaders and their security teams can improve their ability to handle cyber attacks by running cyber security exercises. These exercises should help the organisation identify areas of improvement in people, process and technology, reducing the impact should a real cyber attack occur.

    In this webinar Daniel Norman, Research Analyst, ISF will share how organisations should approach running internal cyber security exercises to support breach identification, prevention and response.
  • Ask the Experts – Challenges & Opportunities with Mobile Workforces & UC
    Ask the Experts – Challenges & Opportunities with Mobile Workforces & UC
    Mark Elwood - Marketing Director, TeleWare Mar 26 2019 2:00 pm UTC 30 mins
    Mobile working is happening in increasing numbers of businesses. The prize is enormous for businesses who get mobile working right in terms of productivity improvements and happier employees. However recent research carried out on behalf of TeleWare highlight several challenges employers and employees face with increasingly mobile workforces.

    So, why aren’t more businesses and employees getting more benefits out of mobile working?

    Join our panel discussion to find out more about these insights and toget all your questions answered live on how to overcome these challenges.

    Topics we plan to cover:
    • The top 3 challenges employees face when working remotely
    • Is GDPR holding you back unnecessarily?
    • Which types of applications, unified communications and collaboration tools are making an impact
    • Why cloud communication technology is crucial to mobility, productivity and connectivity

    As well as sharing exclusive content, there will be opportunities to ask our expert panellists about any burning issues around mobile working beforehand or during the webinar. So, if there is anything you would like to cover, please get in touch.

    Marketing Director, Mark Elwood will host the session and he will be joined by experts:

    • Steve Haworth – TeleWare CEO
    • Nigel Simpson – Sales Manager
  • Global Supply Chain Risk Report: Insights and Findings from Q4 2018
    Global Supply Chain Risk Report: Insights and Findings from Q4 2018
    Dr Heather Skipworth and Dr Emel Aktas, Cranfield School of Management Mar 27 2019 12:00 pm UTC 45 mins
    Join this webinar, led by experts from Cranfield School of Management to hear the results of the Q4 Global Supply Chain Risk Report.

    The Global Supply Chain Risk Report is a joint study by Cranfield School of Management’s Centre for Logistics and Supply Chain Management and Dun & Bradstreet, which investigates the level of supply chain risk faced by European companies with international supplier relationships.

    Analysis has been carried out using data supplied by Dun & Bradstreet, which included around 200,000 anonymous transactions between European buyers and their suppliers who were located in more than 150 countries worldwide.

    During the webinar, we will focus on the Q4 2018 report, published in March 2019. We will cover the background, the key findings and practical implications for procurement professionals.

    Register now to learn:

    - The level of supply risk in Q4 2018
    - The differences across key industry sectors and how this should be considered in procurement decisions
    - How dependency on key suppliers changed compares with the previous quarter

    Presented by Dr Heather Skipworth and Dr Emel Aktas, Cranfield School of Management
  • Understanding Blockchain and its Impact on Legal Technology
    Understanding Blockchain and its Impact on Legal Technology
    Presentation Leaders: Doug Austin and Tom O'Connor Mar 27 2019 5:00 pm UTC 75 mins
    If you think you’re hearing more and more about blockchain and bitcoin, you’re probably right. Blockchain is even being discussed as having potential application in legal technology and electronic discovery. But, what exactly is it? How does it work? And, how do you need to be prepared to address it as a legal professional? This CLE-approved* webcast session will discuss, define and describe blockchain and how it can apply to legal technology and eDiscovery today and in the future. Topics include:

    + History of Blockchain and Bitcoin
    + Defining Key Terms
    + How Blockchain Works
    + Advantages and Challenges of Blockchain
    + Smart Contracts and Other Use Cases for Blockchain
    + Impacts of Blockchain on Legal Technology and eDiscovery
    + Is Blockchain Really as Secure as People Think?
    + Future of Blockchain
    + Resources for More Info

    Presentation Leaders:

    Doug Austin is the Vice President of Products and Services for CloudNine. Doug has over 30 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients. Doug is also the editor of the CloudNine sponsored eDiscovery Daily blog, which is a trusted resource for eDiscovery news and analysis, and has received a JD Supra Readers Choice Award as the Top eDiscovery Author for 2017 and 2018.

    Tom O’Connor is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems. Tom’s consulting experience is primarily in complex litigation matters.
  • Invoice Audit with AI: 15 1/2 Real World Use Cases
    Invoice Audit with AI: 15 1/2 Real World Use Cases
    David Wishinsky, Sr. Product Marketing Manager, AppZen Mar 27 2019 6:00 pm UTC 60 mins
    Invoicing and payments problems can take a variety of forms: fraudulent invoices, invoices that don't represent negotiated terms, or just plain duplicates.

    As your business grows and your vendor list gets larger, how do you stay on top of the validity of each invoice?

    Join David Wishinsky, Sr. Product Marketing Manager at AppZen, as he reveals 15 critical invoice audit and contract compliance use cases that AI makes possible.

    Register to learn how AI can help you to
    - Reduce spend by proactively finding invoice errors and fraud
    - Comply with regulations
    - Stay ahead of auto-renewals and early discount opportunities
  • Next Generation Discovery for ServiceNow
    Next Generation Discovery for ServiceNow
    Mark Gaydos, CMO, at Nlyte Software Mar 28 2019 4:00 pm UTC 60 mins
    Shouldn’t your CMDB be Your Trusted Source of Truth? Is it really?

    In this webinar you will learn:

    - How Next Generation Discovery improves your ServiceNow CMDB data accuracy
    - How you can cost effectively automate the discovery and reconciliation across your entire compute infrastructure
    - How to increase efficiency by up to 20%
    - Find assets you weren’t aware were on your network
    - Significantly reduces the time it takes you to perform audits

    Join this webinar where Mark Gaydos, CMO of Nlyte Software, will present the Next Generation Discovery - It is about what you don't know.
  • SAM 2.0 - The Modern Approach to Software Asset Management
    SAM 2.0 - The Modern Approach to Software Asset Management
    Rich Reyes, EVP of Software Advisory at Connor Consulting and Alex Geuken, CEO, North Europe of Xensam Mar 28 2019 4:00 pm UTC 60 mins
    The evolution of Software Asset Management (SAM) is upon us as the latest trends such as cloud, IoT and digitization are making it more difficult than ever to track, manage and drive a positive ROI for IT investments. With a changing technology landscape, companies require a more modern and agile approach to SAM that incorporates the power of enterprise data, strategic program governance, and repeatable processes. Join Rich Reyes, EVP of Software Advisory at Connor Consulting and Alex Geuken, CEO, North Europe of Xensam as they discuss factors impacting IT and SAM, leading practices to modernize your license management program, and recommendations on how smart technology with thought leadership can get you there.
  • Third-Party Risk Management Trends & Predictions
    Third-Party Risk Management Trends & Predictions
    Shawn Malone, Linda Tuck Chapman, Kelly White, Shane Deay Mar 28 2019 4:00 pm UTC 60 mins
    Managing vendors, third parties and business associates is one of the most challenging aspects of business. In this exclusive webinar, our panel of industry experts will share their perspectives of the current third-party risk management landscape and where it's headed. As an attendee you’ll learn the latest trends in third-party risk and top predictions in 2020. Discover the future of third-party risk management in this can't miss webinar.
  • Day in the Life of an Ethical Hacker: A Discussion w/ Callum Carney, SRT Member
    Day in the Life of an Ethical Hacker: A Discussion w/ Callum Carney, SRT Member
    Callum Carney, Synack Red Team Member, Justin Shaw-Gray, Sales Director, Synack Apr 2 2019 8:00 am UTC 60 mins
    The Synack Red Team (SRT) gives the most talented security researchers across the globe a platform to do what they love and get paid for it. A private network of highly-curated and vetted security researchers, the SRT is challenged every day to deliver exploitation discovery and management for some of the biggest brands in the world. On the Synack platform, researchers have access to the industry’s first ever hacker toolkit built at enterprise scale, to make them more efficient and effective at uncovering critical vulnerabilities that matter.

    These ethical hackers are increasingly being recognised as an important way for businesses to unearth security weaknesses before they can be exploited by online criminals.

    In this Webinar, Synack Red Team member, Callum Carney joins Synack’s Justin Shaw Gray for an open conversation on what a day in the life of an ethical hacker is all about. He’ll discuss:

    - How he started his ethical hacker journey
    - Why he chose Synack
    - How it’s changed in the 2 years he’s been working with us
    - What information is critical to successful testing
    - Why you should be using ethical hackers
    - Processes used when a new target comes online.
    - And much much more


    Callum started his ethical hacking journey by supporting organisations such as Google, Spotify and Local UK Businesses to secure their systems. In January 2017, after noticing all of the great comments regarding the Synack platform (fast payouts, fast response times, etc), he applied for the Synack Red Team and was accepted. During his time with Synack he has worked to secure a multitude of systems including government and Fortune 500 enterprise systems. In addition to his work with Synack Callum is studying for an Undergraduate Masters Degree in Computer Science and working as a Software Tester/Developer for the UKs largest supplier of Functional Skills and GCSE assessments.
  • PCI DSS Compliant Payments: A Prescription to Secure Healthcare Contact Centers
    PCI DSS Compliant Payments: A Prescription to Secure Healthcare Contact Centers
    InstaMed and Semafone Apr 2 2019 3:00 pm UTC 60 mins
    For any healthcare organization, the contact center is a major hub for patient communications, whether it’s processing a great deal of Protected Health Information or collecting payments for billing purposes. With healthcare organizations suffering the most data breaches of any industry, it’s never been more important to take the proper precautions to protect the contact center and prevent fraudsters from stealing this sensitive information.

    While there isn’t a cure-all solution just yet, there are a number of steps healthcare organizations can take to secure their contact center and cut down the risk of a data breach. Join Semafone and InstaMed for an insightful webinar where we’ll offer a prescription to cure the data breach epidemic and better protect healthcare contact centers. We’ll cover:

    - Common insider threats found within healthcare contact centers
    - Prevalent vulnerabilities unique to healthcare organizations
    - Innovative solutions to secure payments within your contact center

    Register now to reserve your space!
  • Penetration Testing or Vulnerability Scanning - Aren’t they the same thing?
    Penetration Testing or Vulnerability Scanning - Aren’t they the same thing?
    Mike Larmie, Federal Solutions Architect, Synack Apr 2 2019 5:00 pm UTC 52 mins
    Take a look behind the curtain and decide for yourself. Join government security expert Mike Larmie as he breaks down the key differences. He will share what your agency needs to know to make sure your security program is both identifying vulnerabilities and reducing risk of exploit. He will cover the techniques, tools, and tradecraft of each, as well as common questions such as:

    -Who performs the services?
    -How often do they run in a network environment?
    -What’s covered in their data output and reporting?
    -What’s their value?

    Mike will present how government agencies are reinventing how they conduct security testing to achieve greater efficiency and ROI. Learn how your agency’s security team CAN achieve security without compromise.

    BIO: Mike Larmie, Federal Solutions Architect at Synack has more than 20 years of IT Security Experience, and has been involved with countless missions within the DoD, Intel and Civilian Federal Agencies. He has a wealth of experience having worked at companies such as Tenable, Sourcefire, Rapid7, Infoblox, G2 and others.
  • Threat Horizon 2021
    Threat Horizon 2021
    Steve Durbin, Managing Director, ISF LTD Apr 4 2019 12:00 pm UTC 45 mins
    Driven by demands for increased speed, automation and efficiency, organisations are about to face a period of significant technological upheaval. Digitisation promises much, and development of the next generation of technologies will bring significant benefits to business and society. To survive in the digital world organisations will have to adapt. To thrive, they will need to evolve. Exploiting digital interconnectivity, competing in the digital arena while understanding the implications of a digital cold war will all become business as usual challenges for industry over the coming months and years.

    In this webinar, Steve Durbin, Managing Director, ISF will identify the key changes to the digital landscape over the next two years, focusing on emerging threats and means of mitigating their impact.
  • 9 Ways to Optimize Your Expense Audit Policy with Artificial Intelligence
    9 Ways to Optimize Your Expense Audit Policy with Artificial Intelligence
    Charlie Warne, Senior Solutions Consultant EMEA, AppZen Apr 5 2019 11:00 am UTC 53 mins
    You have a well thought-out expense policy, but is it efficient? Consistently applied? Are errors and non-compliant spend hitting your bottom line?

    Learn the benchmarks from 1,000 companies in the trending report, "The State of AI in Business Spend". Expense audit authority Charlie Warne will step you through AI-based expense audit how-tos and critical policies for a step-wise function improvement in your expense audit process.

    In this non-salesy one-hour session, you will learn:

    - Policy implementation best practices to get you from sampling to 100% spend audit
    - Pro tips for optimizing audit decisions and surfacing policy violations using AI
    - The 9 must-have policies you haven’t considered, from real-world benchmarks
  • Next-Generation Penetration Testing - Go Beyond Just Compliance
    Next-Generation Penetration Testing - Go Beyond Just Compliance
    Andy Condliffe, Solution Architect Apr 9 2019 5:00 pm UTC 45 mins
    What’s your standard penetration testing getting you? Compliance and a vague summary report. What could you get with a crowdsourced penetration test from Synack?

    - A crowd of top, trusted researchers
    - Technology that optimizes for testing efficiency, control, and visibility
    - Managed workflow processes
    - Own the IP of all discovered vulnerabilities with none of the liability.

    Stop settling for the ordinary...Try the Next-Gen. See how you can go beyond just compliance by joining our webinar. You will learn:

    - The problems that traditional penetration testing haven’t addressed
    - How Synack’s crowdsourced platform offers a better pen test and better customer experience
    - Specific use cases for a Synack crowdsourced penetration test
  • Open Source Risk in M&A by the Numbers
    Open Source Risk in M&A by the Numbers
    Phil Odence, General Manager, Black Duck On-Demand Apr 11 2019 4:00 pm UTC 60 mins
    In over 1,000 codebases audited in 2018, Black Duck Audits found that nearly every one contained open source components. Not only that, but a significant percentage of “proprietary code” overall was open source. Virtually every company building software now depends on open source, and with great reason. However, left unmanaged, open source can lead to license compliance issues plus security and code quality risks. Whether you’re on the buy side or sell side, these risks could negatively affect valuation in an M&A transaction.

    Many acquirers have come to understand all this in concept; the Black Duck audit services group has the data. Join us for this webinar as we answer questions about the code of tech companies being acquired today. We’ll cover:

    • Open source license and security risks by the numbers
    • Why audits have become the norm in M&A tech due diligence
    • How you can get a complete picture of open source risks

    Don’t miss this informational webinar – register today.
  • Understanding Hybrid Resiliency for Business Service Delivery
    Understanding Hybrid Resiliency for Business Service Delivery
    Vincent Rais, Director of Resiliency Services, Uptime Institute Apr 17 2019 4:00 pm UTC 60 mins
    Understand the critical areas required to provide resilient applications and data across a multi-site hybrid environment.
  • Compliance and Policy Management for 2020 and Beyond
    Compliance and Policy Management for 2020 and Beyond
    Sam Abadir, Lockpath Apr 18 2019 4:00 pm UTC 60 mins
    Complying with regulations, managing policies and controls demand that organizations be flexible to meet any requirement thrown at them. It’s imperative that organizations plan to advance compliance and policy management so it can adapt as requirements change. If they’re using manual office tools, like spreadsheets and email this can slow down the advancement process, causing unnecessary risk. In this live webinar, Lockpath’s, Sam Abadir will share what compliance and policy management for 2020 and beyond entails, including:

    • How your organization can gain efficiency from compliance and policy management
    • Strategies for collaborating across departments
    • How streamlining processes can boost productivity
    • Planning ahead for sustained growth

    Discover the future for compliance and policy management by attending this educational webinar. Register now!
  • Optimize Your Third-Party Protection Program
    Optimize Your Third-Party Protection Program
    Bob Maley, Normshield; Tony Rock, Lockpath Apr 25 2019 4:00 pm UTC 60 mins
    Interaction between the financial industry and third-parties has become more complicated due to the combined risk of the financial industry's rapid growth and an increase in third-party relationships.

    In this exclusive webinar, Bob Maley, Chief Security Officer of Normshield, Inc., who designed information security programs from the ground up for major financial services organizations, will share his perspective of third-party risk in the financial services industry. He’ll discuss common financial third-party risk challenges and trends in the market, best practices and challenging scenarios from his career and how he resolved them.

    As an attendee you’ll learn how his real-world third-party risk examples, best practices and recommendations can apply to your organization’s unique needs. Discover how to build and mature a successful third-party risk program in financial services by attending this educational webinar.

    Register now!
  • A New Approach to Managing "Identity Risk"
    A New Approach to Managing "Identity Risk"
    Focal Point Data Risk, Lockpath, SailPoint May 2 2019 4:00 pm UTC 60 mins
    More than 80 percent of hacking-related breaches leverage stolen, default, or weak passwords, and compromising user credentials remains the easiest way for hackers to gain access to your systems and networks. The potential harm is even greater if those credentials belong to a privileged user.

    So, what are leading organizations doing to manage this identity-related risk? The answer is Identity Risk Management – the process of integrating an IAM system with an Integrated Risk Management or GRC program. Identity Risk Management, when executed properly, allows for improved risk visibility, better risk-based decision making, and reduces enterprise risk management siloes.

    In this 60-minute webinar, look into the future as leading identity and risk management experts explore how companies are utilizing this game-changing approach to manage critical identity risks. Our expert panel will outline the best practices for identity risk management, give you a behind-the-scenes look at how it works in the real world, and discuss strategies for overcoming some of the most common hurdles.

    In this webinar, attendees will learn:

    • The benefits of applying an integrated approach to identity risk
    • The key strategies for overcoming common identity risk management
    challenges
    • How to integrate enterprise systems to more effectively manage identity risk
  • Improve Your PCI DSS Management Effectiveness
    Improve Your PCI DSS Management Effectiveness
    Sam Abadir, Lockpath May 15 2019 4:00 pm UTC 60 mins
    Payment Card Industry Data Security Standard (PCI DSS) pushes organizations to achieve six distinct goals in the aim of protecting payment systems from breaches and theft of cardholder data. The requirements supporting the goals force organizations to manage, govern and integrate different departments within the business including IT, security, compliance, risk, incident response, and policy management.

    Those managing this effort quickly realize that the effort to achieve the goals effectively and in a timely manner requires PCI DSS to be a day-to-day part of your business executed with purposeful coordination and immediate access to information to continuously assess the PCI DSS environment, remediate vulnerabilities and report required information.

    In this live webinar, Lockpath’s Sam Abadir will share what a PCI DSS solution looks like, including:

    • Best practices for effectively managing PCI DSS
    • How your organization can gain efficiency from proper a PCI DSS solution
    • Maintaining a strong vulnerability management program with PCI DSS
    • Advantages of managing PCI DSS solutions efforts on a Governance, Risk and Compliance or Integrated Risk Management platform

    Find out what you need to know to better manage your PCI DSS solution by attending this educational webinar. Register now!
  • Audit Management for 2020 and Beyond
    Audit Management for 2020 and Beyond
    Sam Abadir, Lockpath May 16 2019 4:00 pm UTC 60 mins
    As business risks and compliance mandates keep changing, audit teams are having a tougher time prioritizing audits, collecting information and performing analysis required to strengthen the business.

    Businesses are facing more regulations and competitive pressures which increase the need for internal audit teams to provide an orderly approach for evaluating and improving the effectiveness of risk management, internal control, and governance processes to improve the organization.

    Audit teams are being challenged by legacy audit processes that do not evolve at the same speed as business and regulations. These legacy audit processes include the use of spreadsheets, manual evidence requests, share drives and manual reports that often take weeks or months to complete.

    In this live webinar, Lockpath’s Sam Abadir will share what audit management for 2020 and beyond looks like, including:

    • What audit management encompasses
    • How your organization can gain efficiency from proper audit management
    • Advantages of managing audits and risk management efforts on an Integrated Risk Management or Governance Risk and Compliance platform
    • Creating strategies for sustained growth in 2020 and beyond

    Find out what you need to know to manage audit risk in 2020 and beyond by attending this educational webinar. Register now!