Hi [[ session.user.profile.firstName ]]

Health IT

  • Forecasting 2018: An insider’s look to the future of IoT — a webinar
    Forecasting 2018: An insider’s look to the future of IoT — a webinar Aeris Communications Recorded: Jan 16 2018 64 mins
    With IoT still experiencing growing pains, predicting its future can be guesswork at best. Join us for this January 16 webinar where IoT subject matter experts peer into the crystal ball and expand on some of their IoT visions for the near future.

    Moderated by Christina Richards, VP, Global Marketing, Aeris, this webinar will present viewpoints, discuss upcoming IoT directions, innovations, and challenges, and enable audience participation via a Q&A session. All is possible at this future-leaning webinar. Here are a few tidbits.

    “SIM providers are going away. It’s just a matter of when.”
    —Drew Johnson, VP Engineering & Operations, Aeris

    “Automotive transformation via the IoT will become mainstream.”
    —Michelle Avary, VP, Automotive Strategy, Aeris

    “With more than a billion people in India alone, many below the poverty line, IoT will lead the charge for securing basic needs, such as clean water, healthcare, and education.”
    —Dr. Rishi Mohan Bhatnagar, President, Aeris India

    “Security will have to up its game as IoT delivers huge volumes of data.”
    —Syed “Z” Hosain, Chief Technology Officer, Aeris

    My prediction: This will be the only IoT futuristic view you will need to attend this year!

    Sign up now for this futuristic view into the future of IoT.
  • From 10% to 100% Cloud in 3 Years: How (ISC)² is Doing it & Putting Security 1st
    From 10% to 100% Cloud in 3 Years: How (ISC)² is Doing it & Putting Security 1st Wesley Simpson, MSM, COO, (ISC)² Recorded: Jan 16 2018 49 mins
    (ISC)² COO Wesley Simpson, shares the association’s experience as (ISC)² transitions to a 100% cloud-based services model. This interactive discussion explores how (ISC)² decided to go all in with cloud, why the cloud was the best option, how the team ensured its cloud strategy mapped to operational needs, and how security is front and center throughout the entire process. Learn how we are doing it and share your cloud migration experiences. This discussion is for anyone thinking about moving to the cloud, already making the transition or even those who completed a cloud migration but still looking for best practices to apply.
  • Aligning BCP Documentation with a Cyber Incident Response Plan
    Aligning BCP Documentation with a Cyber Incident Response Plan Dr. Stephen Baruch - Certified Business Continuity Professional; Sam Abadir - Lockpath Recorded: Jan 16 2018 44 mins
    Cyber risk has given rise to the Cyber Incident Response Plan. While such plans primarily address the IT response to cyber incidents, less emphasis is directed toward health, safety, property, equipment, and the company’s overall ability to recover.

    Business Continuity Planning (BCP) fills this void, making it essential that BCP documentation is aligned with the Cyber Incident Response Plan. This webinar will offer strategies and examples on how to achieve alignment, including:

    • Developing a risk profile for company assets
    • Instilling collaboration among the various stakeholders
    • Ensuring communications when cyber incidents occur
    • Coordinating Cyber Incident Response Plan with other plans
    • Facilitating a quick, viable recovery of mission-critical functions
  • Estimating respiratory rate from the electrocardiogram and photoplethysmogram
    Estimating respiratory rate from the electrocardiogram and photoplethysmogram Dr Peter H. Charlton Research Associate, King’s College London Recorded: Jan 16 2018 44 mins
    Respiratory rate (RR) is a key physiological parameter that is used in a range of clinical settings for diagnosis and prognosis. Despite its importance, it is usually measured by hand. Over the past 50 years many techniques have been developed to estimate RR from two widely acquired physiological signals: the electrocardiogram (ECG) and the pulse oximetry signal (photoplethysmogram (PPG)). Although these techniques have been the subject of much research, they have not yet been widely integrated into clinical practice. This webinar will provide a comprehensive overview of the state of the art in estimating RR from the ECG and PPG. It is intended to equip researchers with the knowledge and tools to translate this promising technology into patient benefit.
  • Why Hyper-Converged Infrastructure is the New Normal
    Why Hyper-Converged Infrastructure is the New Normal Erwin Meyer, GM & Senior Director and Damian Murphy, Global Solution Architect, Hyper-Converged both of Dell EMC OEM Recorded: Jan 16 2018 47 mins
    As technology becomes inherent in every part of business today, OEMs need to be thinking about digital transformation and which advances and breakthroughs in technology will allow them to best achieve the unique missions of their customers.

    Hyper-converged infrastructure (HCI) solutions accelerate IT transformation by delivering all the building blocks of IT in a single appliance. But how do you simplify the deployment of your solutions on and off-premise while maintaining a high degree of performance, availability and security? What does digital transformation mean for your business?

    Join Dell EMC OEM experts for this live webinar to learn how your organization can simplify how you deliver your solution, scale quickly and maximize workload performance to innovate, stay competitive, and drive stronger business outcomes for your customers.

    In this webinar you’ll learn:

    • What digital transformation means for your business, and why your organization needs to be actively exploring which advances and breakthroughs in technology will give you a competitive advantage today.

    • The benefits of migrating your solutions to a modern HCI architecture.

    • Why working with Dell EMC OEM will give you the ability to innovate fast, optimize the performance of your IP and meet all your varied hyper-converged needs.

    PRESENTERS:
    Erwin Meyer, Senior Director & GM, OEM & IoT Solutions, Dell EMC OEM
    Damian Murphy, Global Solution Architect – Hyper-Converged, Dell EMC OEM
  • Help Wanted! – Addressing the Cybersecurity Skills Shortage
    Help Wanted! – Addressing the Cybersecurity Skills Shortage Gary Beach, Brandon Dunlap, Donald W. Freese, David Shearer, Deidre Diamond Recorded: Jan 15 2018 66 mins
    Panel Moderator: Gary Beach – Author: The U.S. Technology Skills Gap

    Panelist: Brandon Dunlap – Speaker, (ISC)²
    Panelist: Donald W. Freese – Deputy Assistant Director, F.B.I.
    Panelist: David Shearer, CISSP – CEO, (ISC)²
    Panelist: Deidre Diamond – Founder and CEO, CyberSN and #brainbabe
  • Agile Cloud Security
    Agile Cloud Security Paul Oakes, CISSP, ISSAP, CCSP, CSM, CSPO, AWS PSA, Senior Enterprise Security Architect, TD Bank Recorded: Jan 15 2018 61 mins
    How does an established data center-centric organization with high trust and security needs move to the public cloud? How does a waterfall-model-oriented organization make such a move in a timely fashion so as to not be left behind by its competition? What does governance look like for such an organization's use of the public cloud? What can these organizations avoid doing wrong?

    These questions are answered by using the fundamentals of Agile methodologies: prioritization by highest value and risk; technical excellence; and continuous delivery of valuable products as seen through the lense of security principles. Those principles include least privilege, separation of duties, data protection, and visibility to examine and provide solutions for the trust, security and governance needs of cloud-new adopting organizations.
  • Cybersecurity Careers: It’s Not Just Hacking
    Cybersecurity Careers: It’s Not Just Hacking Deidre Diamond Founder and CEO CyberSN and brainbabe.org Recorded: Jan 15 2018 63 mins
    With more than 500,000 unfilled cybersecurity jobs, an industry made up of 10 percent women and a trend of 56 percent of women leaving tech inside 10 years, we have a big problem. The stereotype of a hoodie-clad man at a terminal in a dark room -- a myth our schools perpetuate -- is harmful. Those in cybersecurity can change this right now! Come discuss how to sell all the diverse cybersecurity jobs to women, so they will want to join us.
  • How to Social Engineer Your Users Into More Secure Behavior
    How to Social Engineer Your Users Into More Secure Behavior Erich Kron CISSP, Security Awareness Advocate Recorded: Jan 12 2018 41 mins
    In spite of all the spectacular news stories about advanced persistent threats and targeted hacks from nation-states, the most common security challenge facing enterprises today continues to be social engineering. Successful hackers understand that the user is the weakest link in the security chain. Email phishing campaigns have proven to be the path of least resistance for getting unsuspecting individuals to download and install their malicious software. Getting users to identify phishing attacks and training them not to click on links in email messages is not a trivial task.

    In this webinar, you’ll learn the strategies and techniques that social engineers are finding success with. You’ll also learn how to
    implement an effective security awareness program that focuses on preventing socially engineered attacks and how to validate the results of your training with simulate phishing campaigns.
  • OCC 2018 Part 2: Bank Secrecy Act | Anti-Money Laundering
    OCC 2018 Part 2: Bank Secrecy Act | Anti-Money Laundering Sam Abadir, Director of Product Management, LockPath Recorded: Jan 11 2018 39 mins
    Overview Description
    The Office of the Comptroller of the Currency (OCC) recently released its operating plan priorities for 2018. One priority is familiar to most: Bank Secrecy Act (BSA) and Anti-Money Laundering (AML). Whether you’re a banker or service provider to the financial industry, compliance with BSA and AML is a day-to-day and ongoing challenge. In this webinar, you’ll learn what the OCC’s Compliance and Community Affairs (CCA) Department intends to focus on and the role of technology in managing compliance and risk.

    Attendees will learn:

    • Examiners’ review of programs for BSA/AML compliance and financial inclusion
    • The risk assessment process related to BSA and AML
    • Policies, procedures, and processes that effectively mitigate identified risks
    • The impact of non-compliance on a bank’s growth
    • How GRC technology supports compliance and integrated risk management programs

    Don’t miss this future focused webinar on an OCC priority for 2018. Make plans now to attend.
  • Meltdown and Spectre - How to Detect the Vulnerabilities and Exploits
    Meltdown and Spectre - How to Detect the Vulnerabilities and Exploits Sacha Dawes, Principal Product Marketing Manager, AlienVault Recorded: Jan 9 2018 37 mins
    As you've likely heard, Meltdown and Spectre are vulnerabilities that exist in Intel CPUs built since 1995. Hackers can exploit Meltdown and Spectre to get hold of information stored in the memory of other running programs. This might include passwords stored in a password manager or browser, photos, emails, instant messages and even business-critical documents.

    Join us for a technical webcast to learn more about these threats, and how the security controls in AlienVault Unified Security Management (USM) can help you mitigate these threats.

    You'll learn:

    What the AlienVault Labs security research team has learned about these threats
    How to scan your environment (cloud and on-premises) for the vulnerability with AlienVault USM Anywhere
    How built-in intrusion detection capabilities of USM Anywhere can detect exploits of these vulnerabilities
    How the incident response capabilities in USM Anywhere can help you mitigate attacks

    Hosted By
    Sacha Dawes
    Principal Product Marketing Manager
    Sacha joined AlienVault in Feb 2017, where he is responsible for the technical marketing of the AlienVault Unified Security Management (USM) family of solutions. He brings multiple years of experience from product management, product marketing and business management roles at Microsoft, NetIQ, Gemalto and Schlumberger where he has delivered both SaaS-delivered and boxed-product solutions that address the IT security, identity and management space. Originally from the UK, Sacha is based in Austin, TX.
  • Using GRC to Tackle Audit Management
    Using GRC to Tackle Audit Management Sam Abadir - VP of Industry Solutions, Lockpath Recorded: Jan 9 2018 25 mins
    As business risks and compliance mandates change more rapidly, audit teams are having a tougher time prioritizing audits, collecting information, and performing rigorous analysis required to strengthen the business. Employing disparate toolsets that have historically been used to complete these tasks further complicates the audit process.

    To help organizations address audit management, LockPath’s Sam Abadir will demonstrate the capabilities of the Keylight Platform, which organizes and centralizes all aspects of the audit process, including:

    • Conducting risk assessments.
    • Audit planning.
    • Defining the audit universe.
    • Initiating audit projects and tasks.
    • Performing fieldwork and testing.
    • Generating audit findings and corrective actions.
  • IT Risk Management with the Lockpath Keylight Platform
    IT Risk Management with the Lockpath Keylight Platform Lockpath Recorded: Jan 5 2018 2 mins
    LockPath’s Keylight platform enhances an organization’s IT Risk Management and it's ability to manage, measure and report IT risks.
  • Cyber, Risk and Gender: Is There a White Male Effect in Cybersecurity?
    Cyber, Risk and Gender: Is There a White Male Effect in Cybersecurity? Stephen Cobb: CISSP, MSc, Senior Security Resesarcher ESET | Lysa Myers: Security Researcher III ESET Recorded: Jan 4 2018 57 mins
    Accurate assessment of risk is vital for effective cybersecurity, yet numerous studies show that perceptions of risk vary considerably, between demographic groups and along gender lines. Leveraging established research in areas like cultural theory of risk perception, plus original research by the authors, this session presents evidence of a “white male effect” leading to underestimation of technology risks. Could this account for the persistent insecurity of digital product design? Does it undermine efforts to protect information systems from criminal abuse? Given that most cybersecurity professionals are males who tend to see more risk in technology than their peers, the researchers explore the causes of white male effect, then suggest strategies for countering its influence, such as increasing diversity in technology companies and the cybersecurity workforce.
  • Bringing Order to the Chaos of Operational Risk Management
    Bringing Order to the Chaos of Operational Risk Management Sam Abadir, Director of Product Management, LockPath Recorded: Jan 2 2018 55 mins
    Operational risk management (ORM) is a growing discipline within an organization’s integrated risk management programs. Its practices identify how the daily managed activities in businesses and external events impact strategic goals, value creation and operations. In this fast-paced webinar, LockPath’s Sam Abadir will share how to get the most from your ORM programs. Specifically, you’ll learn how:

    • Current trends and challenges in risk management are addressed with ORM processes
    • Daily managed activities and external events impact overall business operations and strategic goals
    • One organization is using a governance, risk management and compliance (GRC) solution to create value
    • You can leverage a GRC platform to bring order to all this chaos.
  • Applying Key Business Continuity Techniques to Operational Risk Management
    Applying Key Business Continuity Techniques to Operational Risk Management Troy Harris - RSM; Sam Abadir - Lockpath Recorded: Dec 22 2017 50 mins
    In this fast-paced webinar led by Troy Harris, CBCP and leader of RSM’s Business Continuity Planning consulting practice, you’ll learn strategies for managing operational risk through the lens of business continuity planning. Specifically, you’ll learn:

    BCP strategies for improving operational risk management
    RSM’s methodology for BCP
    The five phases of business continuity planning
    How a GRC platform plays a role in business interruption planning
    Don’t miss this opportunity to view operational risk management from the perspective of business continuity planning and the insights attendees will gain in this one-hour webinar.
  • IDC FutureScape: Worldwide Social and Experiential 2018 Predictions
    IDC FutureScape: Worldwide Social and Experiential 2018 Predictions Wayne Kurtzman, Research Director, Social and Experiential Solutions Recorded: Dec 20 2017 44 mins
    In this IDC FutureScape presentation, IDC's Wayne Kurtzman and John Jackson will discuss the key predictions that will impact the evolution of social media and customer experiences over the next one to three years. Senior IT leaders and line-of-business executives will come away with guidance for managing the implications these predictions harbor for their IT investment priorities and implementation strategies.

    About IDC FutureScape
    IDC FutureScape reports are used to shape enterprise IT strategy and planning by providing a basic framework for evaluating IT initiatives in terms of their value to business strategy now and in the foreseeable future. IDC's FutureScapes are comprised of a set of predictions designed to identify a range of pending issues that CIOs and senior technology professionals will confront within the typical three-year business planning cycle. Each prediction is assessed on the basis of its complexity, organizational impact, and time frame to expected mainstream adoption.
  • IDC FutureScape: Worldwide 3D Printing 2018 Predictions
    IDC FutureScape: Worldwide 3D Printing 2018 Predictions Keith Kmetz, Program VP, Imaging, Printing & Document Solutions Recorded: Dec 19 2017 33 mins
    In this IDC FutureScape presentation, IDC's Keith Kmetz will lead a discussion covering the key predictions that will impact the 3D printing market over the next one to three years. Senior IT leaders and line-of-business executives will come away with guidance for managing the implications these predictions harbor for their IT investment priorities and implementation strategies.

    About IDC FutureScape
    IDC FutureScape reports are used to shape enterprise IT strategy and planning by providing a basic framework for evaluating IT initiatives in terms of their value to business strategy now and in the foreseeable future. IDC's FutureScapes are comprised of a set of predictions designed to identify a range of pending issues that CIOs and senior technology professionals will confront within the typical three-year business planning cycle. Each prediction is assessed on the basis of its complexity, organizational impact, and time frame to expected mainstream adoption.
  • The Hot Potato – Who’s Responsible for Vulnerability Management in the Cloud?
    The Hot Potato – Who’s Responsible for Vulnerability Management in the Cloud? Michelle Cobb, CMO, Skybox; Joel Scambray, NCC Group; Derrick Butts, CIO, The Truth Initiative;Brandon Dunlap (Moderator) Recorded: Dec 19 2017 55 mins
    Organizations continue to rapidly move their workloads to the cloud as they benefit from the flexibility and agility this can provide. However, many security processes become increasingly difficult to manage in a Shared Responsibility model. Top among these is vulnerability management which is the key to visibility into virtual and multi-cloud networks. Join Skybox and (ISC)2 on December 19, 2017 at 1:00PM Eastern for our final ThinkTank of the year where we will discuss how to better prioritize and manage vulnerabilities and the best way to provide visibility (and thus, context) into the physical, virtual and multi-cloud environments all organizations find themselves dealing with now.
  • IDC FutureScape: Worldwide SMB 2018 Predictions
    IDC FutureScape: Worldwide SMB 2018 Predictions Ray Boggs, Vice President, Small and Medium Business Research Recorded: Dec 19 2017 45 mins
    In this IDC FutureScape presentation, the IDC Worldwide SMB team discusses the key predictions that will impact CIOs and IT professionals in the worldwide industry over the next one to three years. Senior IT leaders and line-of-business executives will come away with guidance for managing the implications these predictions harbor for their IT investment priorities and implementation strategies.

    About IDC FutureScape
    IDC FutureScape reports are used to shape enterprise IT strategy and planning by providing a basic framework for evaluating IT initiatives in terms of their value to business strategy now and in the foreseeable future. IDC's FutureScapes are comprised of a set of predictions designed to identify a range of pending issues that CIOs and senior technology professionals will confront within the typical three year business planning cycle. Each prediction is assessed on the basis of its complexity, organizational impact, and time frame to expected mainstream adoption.
  • IDC FutureScape: Worldwide Services 2018 Predictions
    IDC FutureScape: Worldwide Services 2018 Predictions Rebecca Segal, Group Vice President, Worldwide Services Recorded: Dec 14 2017 34 mins
    In this IDC FutureScape presentation, IDC's Rebecca Segal will lead a team discussion covering the key predictions that will impact the global services market over the next one to three years. Senior IT leaders and line-of-business executives will come away with guidance for managing the implications these predictions harbor for their IT investment priorities and implementation strategies.

    About IDC FutureScape
    IDC FutureScape reports are used to shape enterprise IT strategy and planning by providing a basic framework for evaluating IT initiatives in terms of their value to business strategy now and in the foreseeable future. IDC's FutureScapes are comprised of a set of predictions designed to identify a range of pending issues that CIOs and senior technology professionals will confront within the typical three-year business planning cycle. Each prediction is assessed on the basis of its complexity, organizational impact, and time frame to expected mainstream adoption.
  • Rideshare to the Cloud: Cloud Security & the Shared Responsibility Model
    Rideshare to the Cloud: Cloud Security & the Shared Responsibility Model Ananda Rajagopal, VP, Products, Gigamon, Dan Watson, Managing Consultant CyberSecurity, IBM, Glenn Hernandez, Frm USCG CISO Recorded: Dec 14 2017 61 mins
    Public clouds provided by services like AWS and Azure continue to surge in popularity with organizations small and large. However, the security of these services and how the responsibility for it is shared can be murky. Organizations want to assure that the public cloud is being used properly by everyone in the enterprise and to run mission-critical applications while meeting compliance and security controls. Join Gigamon and (ISC)2 on Thursday, December 14, 2017 at 1:00PM Eastern for a roundtable discussion on public clouds and the shared responsibility model and how that can help to secure and protect your organization.
  • Total Nitrogen Test Kits as an Alternative to TKN, Nitrate, and Nitrite Tests
    Total Nitrogen Test Kits as an Alternative to TKN, Nitrate, and Nitrite Tests Taylor Reynolds; Ed Askew Ph.D. Recorded: Dec 14 2017 48 mins
    Currently the US EPA has not promulgated a method for the analysis of Total Nitrogen (TN). Most states that have TN regulations require permitee's to measure TN as the composite of TKN, Nitrate and Nitrite. This approach is costly, time consuming, and also susceptible to variability based on the methods used for the individual analytes Merck, KGaA, Darmstadt, Germany is excited to announce the introduction of a Total Nitrogen Test Method consisting of a single spectrophotometric test kit. The method has been evaluated in a multilab study and this webinar will present the results of that study as well as an overview of the savings made possible by utilizing this new method for testing Total Nitrogen.
  • The Future of Authentication in a Hyper Connected World
    The Future of Authentication in a Hyper Connected World Angel Grant, Dir, Identity, Fraud & Risk Mgmt., RSA; Clare Nelson; John Carnes, Anthem; Brandon Dunlap (moderator) Jan 18 2018 5:00 pm UTC 75 mins
    With the ever increasing number of devices and applications that individuals use and access on a daily basis, the authentication of individuals has become paramount for organizations. It needs to be done faster, seamlessly and have less impact on the user. What can organizations do to meet this challenge? Are behavioral analytics an answer? What role does identity assurance play? What about multi-factor authentication? Biometrics? Join RSA and (ISC)2 on January 18, 2018 at 1:00PM Eastern for a discussion on where ID/Access management and authentication is going and how these future advancements can impact your organization.
  • The Auditor's Perspective: An Insider's Guide to Regulatory Compliance
    The Auditor's Perspective: An Insider's Guide to Regulatory Compliance Divya Jeyachandran, Sr. Manager - Payments, Cloud & Technology, Coalfire Jan 18 2018 7:00 pm UTC 60 mins
    Every business that handles personally identifiable data is subject to privacy regulations and standards, such as PCI-DSS for credit card transaction data, HIPAA for medical records privacy, SOC 2 for any organization that delivers services (including SaaS-delivered solutions) and the European Union’s soon-to-be-enacted GDPR (General Data Protection Regulation). There are also privacy and breach disclosure laws that vary from country to country (even state to state in the US), making it a big challenge to keep up with them all. Failure to comply can result in daily penalties and fines, and a data breach resulting from non-compliance could cost millions in settlements, legal fees, and loss of reputation.

    Join special guest, Divya Jeyachandran of Coalfire and John McLeod, CISO of AlienVault to hear what auditors are looking for and how to best prepare for your next audit.

    Topics covered:

    Overview of common compliance requirements
    Best practices for preparing for and demonstrating compliance
    Keys to overcoming challenges in your on-premises and cloud environments
    How a unified security toolset can greatly simplify this process


    Hosted By
    Divya Jeyachandran
    Sr. Manager - Payments, Cloud & Technology, Coalfire
    Divya is a Senior Manager in the Payments practice at Coalfire focusing on data security in cloud environments. She advises and assesses client environments to meet security and compliance requirements such as the PCI DSS. With 8 years of experience in cloud technology, IT security and audit, and network and systems administration combined with understanding the applicability of regulatory security and compliance requirements towards IT solutions, Divya has been the lead QSA for some of the major cloud service providers and security service providers in the industry.
  • The Picture Perfect Future of the US Medical Imaging Industry
    The Picture Perfect Future of the US Medical Imaging Industry Tanvir Jaikishen, Senior Research Analyst - Transformational Health, Frost & Sullivan Jan 23 2018 4:00 pm UTC 60 mins
    The US medical imaging industry is transforming to cope with the challenges of the present and the demands of the future. The current care provision landscape is highly fragmented, and a coherent strategy is required to enhance interoperability among stakeholders across the imaging ecosystem. Stakeholders across the industry must also come together to eliminate redundancies and duplications, and streamline the imaging process, to improve the patient experience.
  • Thrive in the DX Era with Data Services for Hybrid Cloud
    Thrive in the DX Era with Data Services for Hybrid Cloud Ritu Jyoti, Research Director, Enterprise Storage, Server, and Infrastructure Software Jan 25 2018 5:00 pm UTC 60 mins
    This IDC Web Conference will feature data highlights from the inaugural IDC Worldwide Data Services for Hybrid Cloud Forecast. Every vertical industry is now seeing the impact of digital transformation (DX). In DX, data is core as every change and process relies on converting data into actionable insights. And the leading digital organizations are discovering that the cloud – in terms of its power to deliver agility and flexibility in data management and faster time to insights – is indispensable for achieving their DX business objectives.

    IDC Research Director Ritu Jyoti will discuss the latest trends in hybrid/multicloud deployments, proliferation of application deployment models and data formats across hybrid IT, associated data management challenges, and how data services for hybrid cloud can help organizations gain a competitive edge and thrive in the DX era.
  • OCC 2018 Part 3: Change Management to Address New Regulations
    OCC 2018 Part 3: Change Management to Address New Regulations Sam Abadir, Director of Product Management, LockPath Jan 25 2018 5:00 pm UTC 60 mins
    The Office of the Comptroller of the Currency (OCC) recently released its operating plan priorities for 2018. A top priority is change management to address new regulation requirements. Whether you’re a banker or service provider to the financial industry, you may be aware of updated or new regulations like the National Flood Insurance Reform Act of 1994, the Military Lending Act, and the Prepaid Card Rule. In this webinar, you’ll learn what OCC’s Compliance and Community Affairs (CCA) Department intends to focus on and the role of technology in managing compliance and risk.

    Attendees will learn:

    • What to consider when designing, operating or improving their change management process
    • The increased focus on fair lending from a quantity and quality perspective
    • Policies, procedures, and processes for credit offered under the Military Lending Act
    • What CCA examiners are looking for with banks relying on third-party relationships
    • How GRC technology supports compliance and integrated risk management programs

    Don’t miss this future focused webinar on an OCC priority for 2018. Make plans now to attend.
  • Counter the Careless Click, Tools to Help You Train Your Users
    Counter the Careless Click, Tools to Help You Train Your Users Erich Kron CISSP, Security Awareness Advocate Jan 25 2018 7:00 pm UTC 60 mins
    Cybercriminals are successfully and consistently exploiting human nature to accomplish their goals. Employee training is tied as the third-most-effective method (higher than antivirus) of decreasing the cost of a data breach.*

    Many IT pros know users are the weakest link in network security but don’t exactly know where to start when it comes to creating a security awareness program that will work for their organization.

    Join this 30-minute webinar “Counter the careless click, tools to help you train your users” where Erich Kron CISSP, Security Awareness Advocate of KnowBe4, will provide a practical session with tips and free tools you can implement now to help you create your “human firewall”.

    Erich will cover:

    * Current threat landscape
    * Top 5 tips for security awareness
    * How to easily create your security awareness program
    * Outlining how and where tools are helpful

    * Based on recent research by the Ponemon Institute
  • Achieving Compliance Agility with a Harmonized Controls Framework
    Achieving Compliance Agility with a Harmonized Controls Framework Lynn Heiberger - Unified Compliance; Sam Abadir - Lockpath Feb 15 2018 5:00 pm UTC 60 mins
    In our uncertain regulatory climate, it’s essential for compliance to remain flexible. One way to achieve this is by implementing a harmonized controls framework. In this webinar, Lockpath and Unified Compliance will explore the growing need for harmonized controls and how this type of controls framework can bring agility to compliance--a necessity in a time of regulatory uncertainty.

    Attendees will learn:
    • The concept and reasons for using a single controls framework
    • How one organization quickly addressed updated regulatory guidance using a harmonized controls framework
    • How to achieve compliance agility with harmonized controls and an integrated risk management platform
  • Plan the Work & Work the Plan – Continuing the Move to the Cloud
    Plan the Work & Work the Plan – Continuing the Move to the Cloud Tom Thomas, Director of Enterprise Architecture, F5; Ryan Goode, Sr Mgr., Tech Operations, (ISC)2; Brandon Dunlap (Moderator) Feb 15 2018 6:00 pm UTC 75 mins
    Chances are, your organization has made a move to the cloud. In fact, most enterprises run approx. 45% of their applications and infrastructure in the cloud with that number sure to increase in the next 12 months. But as you relocate more into the cloud, what’s your strategy? What are you moving? What benefit are you seeking? Different businesses have different goals and objectives. Join F5 and (ISC)2 on February 15, 2018 at 1:00PM Eastern for a discussion on the continuing evolution of cloud migration and how organizations should prepare, strategize and execute their cloud journey while addressing operational needs, security concerns and the options that cloud-based services can bring.
  • 2018 Frost & Sullivan Predictions and Outlook for Digital Health
    2018 Frost & Sullivan Predictions and Outlook for Digital Health Daniel Ruppar, Global Program Director - Digital Health Feb 22 2018 4:00 pm UTC 60 mins
    To help clarify the rapidly changing industry, Frost & Sullivan’s Digital Health experts invite you to join us for the webinar: Digital Health Predictions – Innovation, Opportunity & Challenges. Learn how to prepare for the future and gain insight into the hot topics you need to be aware of to drive your business forward into the next era of healthcare.

    Expert Insights You Will Not Want to Miss:

    • Hear Market predictions from world-renowned analysts
    • Learn areas of growth and controversy for 2018
    • Better understand the value of Artificial Intelligence
    • Get answers on if mHealth is dead
    • Learn more about crucial vendors to watch this year
  • How to Buy a GRC Platform
    How to Buy a GRC Platform Adam Billings - Principal Consultant, Lockpath Feb 22 2018 5:00 pm UTC 60 mins
    Buying a GRC platform isn’t so much about sizing up the options as it is about analyzing your company’s needs. After that, it’s about knowing which questions to ask vendors and how to evaluate their offerings while keeping business processes front and center. In this webinar, we’ll share how to self assess needs and benchmark your GRC maturity. Throughout the hour, we’ll offer buyer’s tips and empower you to buy the GRC platform that’s right for your company.

    In this webinar, you will discover:

    • How to assess your organization and determine what type of platform is right for you
    • What questions to ask when evaluating GRC vendors
    • Tips for building a business case for a GRC platform and estimating potential ROI

    In our increasingly competitive and digital world, organizations need to evolve to be more competitive. For many, an untapped resource is GRC and its role in increasing efficiency and organizational resiliency. Explore what’s possible in this educational webinar.
  • The Pulse of Outsourcing 2H 2017: IDC's Semiannual Look at Rolling 4-Quarter Dea
    The Pulse of Outsourcing 2H 2017: IDC's Semiannual Look at Rolling 4-Quarter Dea David Tapper and Xiao-Fei Zhang, IDC Global Services Markets and Trends Feb 22 2018 5:00 pm UTC 60 mins
    In this IDC Web conference, outsourcing analysts David Tapper and Xiao-Fei Zhang will leverage IDC's BuyerPulse Services Deals Database to provide an analysis and assessment of outsourcing deals based on a rolling 4-quarter view from Q3 2015 through Q4 2017. The analysis will better enable service providers to pursue key markets, incorporate strategic capabilities, and ensure that they are optimally positioned.
  • The One Man SOC - How Unified Security Management Simplifies Threat Detection
    The One Man SOC - How Unified Security Management Simplifies Threat Detection Sacha Dawes, Principal Product Marketing Manager, AlienVault Feb 22 2018 5:00 pm UTC 60 mins
    With the proliferation of single-point security solutions, many IT teams are struggling to efficiently monitor the security of their environments, and respond quickly to threats. It can be a real challenge to juggle multiple tools that weren’t designed to work together, which wastes time and resources that small IT security teams can’t afford to lose.

    Watch this webcast to learn how one of AlienVault's customers was able to build a security operations center (SOC) on a budget with the AlienVault toolset, and extend security capabilities via the AlienApps ecosystem.

    In this webcast, we'll cover:

    Essential security capabilities that all IT teams should have, regardless of size
    Challenges of integrating and maintaining multiple security tools
    How AlienVault customer Guy Dulberger operates his "One Man SOC" with the AlienVault toolset
    A demo of how AlienVault Unified Security Management speeds threat detection and incident response

    Hosted By
    Sacha Dawes
    Principal Product Marketing Manager

    Sacha joined AlienVault in Feb 2017, where he is responsible for the technical marketing of the AlienVault Unified Security Management (USM) family of solutions. He brings multiple years of experience from product management, product marketing and business management roles at Microsoft, NetIQ, Gemalto and Schlumberger where he has delivered both SaaS-delivered and boxed-product solutions that address the IT security, identity and management space. Originally from the UK, Sacha is based in Austin, TX.