Hi [[ session.user.profile.firstName ]]

Health IT

  • Security Awareness: Securing the Human Layer
    Security Awareness: Securing the Human Layer
    Roger Grimes, Scott Lowe Recorded: Jun 14 2019 59 mins
    It’s common knowledge that humans are the leading cause of IT security incidents. Whether accidental or intentional, a human-centric root cause lies at the center of literally every security incident.

    You can’t just eliminate all the humans, so security professionals are left to find reasonable measures to ensure that the human element of their organizations can act as a bulwark of security rather than as a catalyst for disaster. This is easier said than done and requires constant vigilance.

    Human security is not a “one and done” effort. It’s an ongoing process often including automated security awareness training and simulated phishing. How do you make it happen? What steps can you take to get there? What are the real problems that need to be solved? Most importantly, do your employees really understand their critical role in protecting your organization?
  • 10 Incredible Ways You Can Be Hacked Through Email & How To Stop The Bad Guys
    10 Incredible Ways You Can Be Hacked Through Email & How To Stop The Bad Guys
    Roger Grimes Recorded: Jun 14 2019 68 mins
    Email is still the #1 attack vector the bad guys use. A whopping 91% of cyberattacks start with a phishing email, but email hacking is much more than phishing and launching malware!

    Join Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist and security expert with over 30-years of experience, for this webinar where he will explore 10 ways hackers use social engineering to trick your users into revealing sensitive data or enabling malicious code to run. Plus, he'll share a (pre-filmed) hacking demo by KnowBe4's Chief Hacking Officer Kevin Mitnick.

    Roger will teach you:

    •How silent malware launches, remote password hash capture, and how rogue rules work
    •Why rogue documents, establishing fake relationships and getting you to compromise your ethics are so effective
    •Details behind clickjacking and web beacons
    •Actionable steps on how to defend against them all

    If all you were worried about were phishing attempts, think again!
  • Business Continuity Measures for Volatile Times
    Business Continuity Measures for Volatile Times
    Augie Gonzalez, Director of Product Marketing, DataCore Recorded: Jun 13 2019 45 mins
    Every master plan is created to fulfill specific demands. But what if you did not consider one or two unpredictable factors? This webinar will provide insights to help you maintain business continuity by adapting to those inevitable, yet unforeseen turn of events.

    - Find out where your organization ranks within the Vulnerability Index
    - How to protect your BC/DR plans and avoid common storage pitfalls
    - Discover the new standard of BC/DR planning and stay future-ready
  • Trends in Compliance: How IT Should Prepare for the Future
    Trends in Compliance: How IT Should Prepare for the Future
    Robert Kreuscher, Solution Architect - Professional Services. Martin Tuip, Sr. Product Marketing Manager Recorded: Jun 13 2019 59 mins
    Join this webinar for an interactive discussion about the need for cross-departmental alliances, and best practices for joining efforts and technology across your organization.

    You’ll learn:

    - How evolving regulations and compliance technology will impact IT
    - How IT can help with your organization's compliance strategy
    - How new RegTech can improve compliance readiness while also improving IT value to an organization
  • AI-Driven EDR - The Machine Age of Information Security
    AI-Driven EDR - The Machine Age of Information Security
    Brian Robison, BlackBerry Cylance; Eric Walters, Burns & McDonnell; Travis Farral, CISO, LEO Cyber Security; B. Dunlap Recorded: Jun 13 2019 59 mins
    The historical evidence of rules-based solutions in the Endpoint Detection and Response (EDR) has proven that this approach is unable to keep up with the speed of the shifting threatscape. Join BlackBerry Cylance and (ISC)2 on June 13, 2019 at 1:00PM Eastern where we will explore how machine learning and artificial intelligence are closing the OODA (observe–orient–decide–act) loop on the attackers. We’ll also examine how you can gain an advantage over emerging threats, your time to respond and impact of artificial intelligence on security professionals.
  • Orphan medicines launch excellence: sustaining launch success
    Orphan medicines launch excellence: sustaining launch success
    Peter Meeus, European Orphan Medicines, Sarah Rickwood, IQVIA, Angela McFarlane, IQVIA, Paul Tunnah, pharmaphorum Recorded: Jun 13 2019 72 mins
    Launching orphan medicines excellently will become even more important over the next five years as more patients with rare diseases have pharmacotherapies available.

    There are also a growing number of disease-focussed registries, increasing public and policy maker awareness, and significant R&D investment in orphan drugs, as well as in digital technologies to support trials and treatment.

    But a new frontier of challenge faces orphan medicines companies as the gap between orphan medicines and mainstream specialty products narrows.

    To understand how to succeed in launching an orphan medicine in the coming years, companies must learn from past launches and apply an orphan medicines-focused launch excellence framework for success.

    This internationally relevant webinar will provide US and European examples to illustrate the ways in which the pharmaceutical market for orphan medicines is changing and how, consequently, launch strategies must evolve.

    This pharmaphorum debate, held in partnership with IQIVA, will also look at how pharmaceutical companies can optimise all the activities needed to take orphan medicines from clinical development to commercialisation, including:

    •Identifying the three fundamental challenges for orphan medicine launch excellence
    •Discussing the ways in which companies launching orphan medicines can learn from excellence in mainstream launches
    •Examining, in-depth, the specific areas of focus which are crucial for orphan medicines excellence.
  • Webisode 1: 2019 Cyber Threat Landscape
    Webisode 1: 2019 Cyber Threat Landscape
    Patrick Wheeler, Director of Threat Intelligence, Proofpoint Recorded: Jun 12 2019 51 mins
    This year, a shakeout in the cryptocurrency market will change the way threat actors move -- and steal -- money, while email fraud moves from spoofing identities to using stolen identities. These are just some of the tactics bad actors will use in 2019.

    Every year Proofpoint researchers look ahead at the trends and events likely to shape the threat landscape in the year to come. Join us as we discuss:

    - Predictions for the 2019 threat landscape
    - Key actions you can take to prepare your organization
    - Top resources to help support your security efforts
  • Ensure Organizational Compliance with CCPA
    Ensure Organizational Compliance with CCPA
    Sam Abadir, Lockpath Recorded: Jun 12 2019 45 mins
    The California Consumer Privacy Act (CCPA) is the first major U.S. privacy law to unfold. This law has interested other states in following suit, which may soon call for a national U.S. Privacy Law. Organizations are uncertain how to comply with CCPA, which takes effect January 1, 2020.

    In this live webinar, Lockpath’s Sam Abadir will share what preparation for CCPA compliance entails, including:

    • Protecting consumer data
    • Applying technology to processes
    • Managing multiple channels for consumers exercising their rights
    • Ensuring a fast response to breaches
    • Requirements of CCPA
    • Strategic approach to CCPA
    • Best practices for managing CCPA
    • Best practices for responding to privacy incidents

    As an attendee you’ll learn how to approach CCPA to prepare yourself for the new law in 2020 and set the foundation for other privacy laws as they impact your organization. Register now!
  • I'm a White Male, Why Should I Care about Diversity?
    I'm a White Male, Why Should I Care about Diversity?
    Robert Principe Recorded: Jun 12 2019 63 mins
    Robert Principe joins us for a fireside chat to discuss The Diversity Dividend – when diversity and inclusion become a key enabler of growth and makes a positive impact to a company’s financial performance.

    Robert Principe has guided organizations for over 25 years to address the challenges of defining and implementing effective diversity and inclusion strategy (D&I). Robert’s background includes 13 years as a Diversity and Inclusion (D&I) Manager. In this capacity, he had direct responsibility for the full scope of diversity and inclusion work including assessment of organizational culture, strategic planning, support for professionals of color and the LGBTQ population, and the design and facilitation of all diversity and inclusion training and programming. Robert’s development of “10 Steps for White Men to Become Better Allies for Diversity and Inclusion” is a direct result of his own D&I journey as a white, cisgender, heterosexual male as well as from years of gathering data facilitating white male D&I focus groups.
  • Digital Health Predictions and Trends—What to Expect in 2020
    Digital Health Predictions and Trends—What to Expect in 2020
    Mike Jude (Moderator), Frost & Sullivan Digital Health Experts Recorded: Jun 11 2019 56 mins
    Are you curious about how Digital Health will change through the end of 2020? Are you looking for new growth opportunities to capitalize on now to ensure a successful future?

    We invite you to attend the complimentary webinar, Digital Health Predictions and Trends—What to Expect in 2020, moderated by Mike Jude, Ph.D., Research Manager, along with our Digital Health experts. They will provide expert insight and predictions on new developments poised to help you build a growth pipeline. Insights will be based on the likely impact of technologies such as AI, Big Data, predictive analytics, and telemedicine, as well as evolving areas such as new billing practices and Femtech. Learn about real-world success stories as well as potential mistakes you must avoid.

    Key Takeaways:
    • Learn what the digital health market potential is through 2020
    • Better understand which technologies and services will be the primary industry drivers in the short term
    • Identify growth opportunities in digital health
    • Explore the impact of new technologies and regulations on market potential
    • Gain insight on new approaches to achieve more efficient management of the healthcare process
  • Innovative solutions from Industry 4.0
    Innovative solutions from Industry 4.0
    Michael May, President and CEO, CCRM at Centre For Commercialization Of Regenerative Medicine and Philip G. Vanek of GE Recorded: Jun 10 2019 75 mins
    -Potential to providing real-time visibility
    -Control across complex cell and gene therapy supply chains
    -How can industry 4.0 drive the industry towards increased industrialization?
  • Pathways to Cloud Data Warehouse Modernization
    Pathways to Cloud Data Warehouse Modernization
    David Loshin, TDWI Deepa Sanker, Informatica Recorded: Jun 9 2019 61 mins
    As the volume of data across enterprises continues to grow exponentially, organizations are looking to cloud data warehouses for scalability, flexibility at lower costs. But moving to a cloud data warehouse requires planning and a strategic approach.

    In this upcoming webinar, join David Loshin from TDWI along with Deepa Sankar and Nassir Khan from Informatica for a discussion of best practices to achieve faster time-to-value from cloud data warehousing.

    You’ll learn:
    - Economic benefits of cloud data warehousing
    - Core capabilities for modernizing your data warehouse in the cloud
    - Why a comprehensive integration platform as a service (iPaaS) plays a key role in success
  • 5 Easy Steps to Connect and Secure IoT Devices
    5 Easy Steps to Connect and Secure IoT Devices
    Robert Dobson, Device Authority and Jon Hill, InVMA Recorded: Jun 6 2019 50 mins
    Sign up to this webinar to learn:
    - How to connect your devices
    - Challenges of securing devices, applications and data, and how to overcome them
    - Real world examples of secure connected devices for Industrial and Healthcare

    IoT adoption has increased in recent years due to the benefits gained by organizations in almost every industry, just by connecting their devices to the internet. Connected sensors, actuators and edge nodes enable companies to pick up on inefficiencies and problems sooner and save time and money while supporting business intelligence efforts.

    In manufacturing specifically, IIoT holds great potential for quality control, sustainable and green practices, supply chain traceability and overall supply chain efficiency. In an industrial setting, IIoT is key to processes such as predictive maintenance, enhanced field service, energy management and asset tracking.

    The IoT has the potential to create a world where billions of devices can connect and communicate seamlessly. But bridging the gap between the digital and physical has proven harder than expected. Most deployments were brownfield and required technological, architectural, and organizational integration with legacy solutions.

    In addition, Security has turned out to be one of the greatest barriers to widespread IoT adoption. The good news is that we’ve come to recognize a secure by design approach as the most viable security option for organizations in IIoT, healthcare and smart connected products. Security architectures must be flexible and allow for multi-vendor collaboration. Ultimately, a security solution which prevents and protects against security attacks is better than a detect and respond method which many traditional IT security vendors offer today.
  • Livestream Video - CISO Challenges and How to Solve Them
    Livestream Video - CISO Challenges and How to Solve Them
    Darren Thomson, Symantec | David Boda, Camelot Group | George Patsis, Obrela Security Industries | Martin Mackay, Proofpoint Recorded: Jun 5 2019 43 mins
    Today's CISO faces a myriad of challenges when it comes to securing the enterprise. From budgetary concerns and vendor confusion to dealing with the chronic lack of cyber talent, to addressing the disappearing security perimeter, CISOs are looking for ways to automate security operations and leverage AI to do more with existing teams and fewer tools.

    Join security experts across the industry for an interactive discussion on:
    - What keeps CISOs up at night
    - Strategies for breach prevention
    - Strategies for making the most of AI technology and human talent
    - Coping with analyst fatigue
    - Threats on the horizon
    - Recommendations for strengthening security

    David Boda, CISO, Camelot Group
    Darren Thomson, CTO - EMEA, Symantec
    George Patsis, CEO, Obrela Security Industries
    Martin Mackay, Senior Vice President - EMEA, Proofpoint

    Moderated by Yotam Gutman, Founder & Community Manager, Cybersecurity Marketing Community
  • How Cloud is transforming software businesses
    How Cloud is transforming software businesses
    Leighton James, CTO at UKCloud Recorded: Jun 5 2019 18 mins
    You’ve spent years developing a great application based on a unique domain expertise that addresses a particular niche. But the market is changing, new software providers are driving competition and customers no longer want to be responsible for software on-premises and want to consume it as a service, where you become responsible for the hosting, infrastructure and more flexible commercial model. So how do you take on this added burden and continue to deliver great solutions?

    Join our CTO Leighton James as he answers this question, guiding you through:
    - How Cloud is transforming the software business & enabling new opportunities
    - What SAAS is and why it matters to your customers
    - The growing opportunity for specialist software across UK Public Sector
    - Where to start and how UKCloud can help

    By clicking through to this webinar you acknowledge that you are opting in to be contacted by email and phone by UKCloud LTD with promotional material. We will never sell your information to any third parties. You can, of course unsubscribe at any time. View our full Privacy Policy at https://ukcloud.com/legal/
  • IT Industry Outlook 2019
    IT Industry Outlook 2019
    Fiona Challis, Channel Enablement & Sales Expert, Next Gen Recorded: Jun 4 2019 41 mins
    CompTIA explores the forces shaping the IT industry, its workforce, and its business models in 2019. Some of the trends we’re monitoring and will discuss include:

    • How the cloud, edge computing, and 5G form modern economic infrastructure
    • How IoT and AI are opening new doors for ambient computing
    • How distributed technology models challenge existing structures
    • How the business of emerging technology prompts sales channels’ reinvention
    • How partnerships are bridging gaps in the new tech ecosystem
    • How persistent tech personnel shortages are fueling new, creative staffing solutions
    • How global tech hubs shine the spotlight on the ingredients for innovation
  • Hacking Data Sources That Bad Guys Use, Revealed by Kevin Mitnick
    Hacking Data Sources That Bad Guys Use, Revealed by Kevin Mitnick
    Perry Carpenter Recorded: May 31 2019 3 mins
    Ever wonder how hackers, spies, and con-artists gather such detailed and convincing intel on their targets? Kevin Mitnick, the world's most famous hacker and KnowBe4's Chief Hacking Officer, knows. And he'll share those secrets with you on this upcoming webinar. Register at: https://event.on24.com/wcc/r/1987306/120DACBD77DBFB3669AC398388105E40?partnerref=BrightTALK
  • Emerging technologies in Europe: The Digital Octopus' strategy
    Emerging technologies in Europe: The Digital Octopus' strategy
    Gabriele Roberti and Andrea Siviero Recorded: May 30 2019 30 mins
    Innovation Accelerators such as Artificial Intelligence, Internet of Things, Augmented & Virtual Reality and other emerging technologies are drawing unique opportunities and challenges across European vertical markets, with multiple digital use cases unlocking new technology scenarios for companies.

    In this IDC web conference Gabriele Roberti and Andrea Siviero from the IDC European Customer Insights & Analysis team will discuss the combination of these emerging technologies and the leading disruptive use cases across European industries, such as professional services, retail, healthcare and others, answering questions such as:
  • ITSM Automation—How to Get Started and Score Quick Wins
    ITSM Automation—How to Get Started and Score Quick Wins
    Jon Morley Recorded: May 30 2019 25 mins
    Join Cherwell for a webinar outlining the top considerations for implementing automation within the IT and service desk environment. As businesses look to streamline processes, there are several ‘quick wins’ to enhance efficiency within existing IT workflows—removing the need for resources to manage common, repetitive tasks, and allowing greater focus on higher value activities.
    In this session we’ll discuss:
    •Why should you automate workflows and processes within the IT service desk
    •What is are the most common IT(SM) automation use cases?
    •How to get started with automation, and demonstrate early—and impressive!—wins

    This webinar is an introductory-level discussion, and is the first in a series of webinars covering various topics around IT automation.
  • Cheating Death by PowerPoint: Slide Makeovers
    Cheating Death by PowerPoint: Slide Makeovers
    Laura Foley, Cheater of Death by PowerPoint Recorded: May 29 2019 62 mins
    You’ve sat through boring presentations with terrible slides. But what makes these slides so hard to look at? And what can be done to improve them? Attend this webinar and learn about common slide design mistakes how to fix them. You’ll learn how the Analyze and Synthesize technique can be used to redesign problem presentations. At the end of this webinar, you’ll have a better understanding of how to create presentations that are simple, easy to understand and compelling!
  • Preparing for your journey to the Cloud – Assessment to Business Case.
    Preparing for your journey to the Cloud – Assessment to Business Case.
    Tim Lawrence, UKCloud & Mark Melvin, Shaping Cloud Recorded: May 29 2019 19 mins
    So you’ve decided you’d like to reap the benefits of Data Centre Modernisation, reducing costs, increasing your operational agility and spending more time focusing on your core business. But you may be left wondering what you need to do, what approaches you can take and some of the key pitfalls to avoid.

    Without a coherent plan, your use of cloud is tactical and piecemeal. It’s difficult to keep control of these new cloud services whilst also keeping your existing IT afloat. In effect things are getting worse and you need them to get better.

    That’s why here at UKCloud we have our Professional Services team – a handpicked group of our experienced multi-cloud experts who can make the process of creating a pragmatic, business-led and coherent cloud adoption plan a breeze.

    Learn more by registering for our upcoming webinar, hosted by Cloud Transformation expert, Tim Lawrence and joined by Mark Melvin from Shaping Cloud, will guide you through this process and help you begin your transformation journey with confidence.


    *How cloud is not the answer to everything.
    *Why the strategy and business case are critical to get the outcome you are looking for.
    *Customer Case Study.
    *An overview of how cloud assessments are performed.

    By clicking through to this webinar you acknowledge that you are opting in to be contacted by email and phone by UKCloud LTD with promotional material. We will never sell your information to any third parties. You can, of course unsubscribe at any time. View our full Privacy Policy at https://ukcloud.com/legal/
  • 12 Ways to Defeat Multi-Factor Authentication
    12 Ways to Defeat Multi-Factor Authentication
    Roger Grimes Recorded: May 24 2019 62 mins
    Everyone knows that multi-factor authentication (MFA) is more secure than a simple login name and password, but too many people think that MFA is a perfect, unhackable solution. It isn't!

    Join Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist, and security expert with over 30-years experience, for this webinar where he will explore 12 ways hackers can and do get around your favorite MFA solution.

    The webinar includes a (pre-filmed) hacking demo by KnowBe4's Chief Hacking Officer Kevin Mitnick, and real-life successful examples of every attack type. It will end by telling you how to better defend your MFA solution so that you get maximum benefit and security.

    You'll learn about the good and bad of MFA, and become a better computer security defender in the process, including:

    - 12 ways hackers get around multi-factor authentication
    - How to defend your multi-factor authentication solution
    - The role humans play in a blended-defense strategy
  • Chronicle #2: Better Threat Hunting and Investigation with VirusTotal
    Chronicle #2: Better Threat Hunting and Investigation with VirusTotal
    Brandon Levene, Head of Applied Intelligence; Chronicle; Brandon Dunlap (Moderator) Recorded: May 24 2019 59 mins
    Get a deeper look into malware campaigns using VirusTotal's newest tools. Learn from the expert how to use the platform and how best to leverage the data available to you and your security team. By better understanding the breadth and depth of malicious campaigns, researchers can better investigate and mitigate impact. Recently introduced improved relational metadata as well as expanded retroactive and proactive hunting capabilities allow investigators to dive deep into malware within a global data source.
  • Changing the Risk Conversation
    Changing the Risk Conversation
    Dennis Keglovits Recorded: May 24 2019 56 mins
    Does your organization successfully communicate risk across departments? Or does essential information get lost in translation? Effective communication is the ‘glue’ for a successful risk management program. Making sure every part of an organization is on the same page can be challenging when language changes from department to department.

    In this can’t miss webinar, Lockpath’s, Dennis Keglovits will share his experience with communicating risk successfully across an organization, from the IT department to the executive suite.

    As an attendee you’ll learn:

    • Key concepts for standardizing your risk language
    • Options for establishing better lines of communications
    • Better communication leads to better collaboration
  • HIPAA Compliance
    HIPAA Compliance
    Lockpath Recorded: May 23 2019 2 mins
    HIPAA Compliance has many healthcare organizations struggling to keep up. Learn how the Keylight Platform is the solution you need for HIPAA compliance.
  • Cloud Security Best Practices for Defending Against Targeted Attacks
    Cloud Security Best Practices for Defending Against Targeted Attacks
    Tyler Moffitt, Sr. Threat Research Analyst, Webroot Jun 18 2019 3:00 pm UTC 60 mins
    Recent years has seen a move towards more targeted attacks, especially in the realm of ransomware. Attackers are no longer trying to infect the globe, choosing instead to carefully select targets to increase their chances of success and maximise payouts.

    SMBs find themselves in the crosshairs of these attacks. Their defense and contingency plans often leave them vulnerable to ransomware, information theft, and other attacks.

    Is your organisation a soft target? Automated processes can often determine this in a matter of minutes, and cybercriminals are aware.

    Learn how to lift your organisation from easy target to robustly defended with learnings from this webinar.
  • Der Schlüssel zu Produktivität im Digitalen Unternehmen
    Der Schlüssel zu Produktivität im Digitalen Unternehmen
    Pierre-Andre Aeschlimann Jun 19 2019 8:30 am UTC 45 mins
    Die Digitalisierung verursacht eine radikale Umgestaltung von Unternehmen und sogar ganzer Branchen. Es ist eine radikale Umformung der Interaktion zwischen Kunden und Unternehmen aber auch, immer wichtiger, zwischen Mitarbeiter und deren Unternehmen. Die Rolle der IT ist strategischer als je zuvor. Ein unternehmensweiter Service Management Ansatz hat sich als der beste Ausgangspunkt gezeigt.

    In diesem Kontext werden wir folgende Themen und deren Wichtigkeit erklären:
    •Wie verwalte ich Services effizient quer durch das ganze Unternehmen (IT, HR, Security, Facilities, Marketing, Customer Service,...) ?
    •Wie automatisiere ich die dazugehörenden Prozesse oder Arbeitsabläufe intelligent und einfach?
    •Wie ermögliche ich meinen Kunden und Mitarbeitern eine moderne, intuitive und immersive Erfahrung/Erlebniss/Experience, und warum ist ganz speziell die Employee Experience so wichtig?
    •Das Ganze illustriert durch Fallbeispiele von Kunden aus dem deutschsprachigen Raum (DACH)
  • The Gig Economy: Changing How You Manage Projects
    The Gig Economy: Changing How You Manage Projects
    Candice Benson Jun 19 2019 4:00 pm UTC 60 mins
    Our economy is on fire! The latest numbers here in the U.S. show that companies added 263,000 jobs in April alone. And unemployment is down to 3.6%, which is the lowest since 1969. All of this growth and opportunity has companies struggling to hire the talent they need – and so they are turning to consultants and freelancers, those making up the Gig economy. Studies are showing that the need for supplementing their workforce will not slow down – especially in the area of project management.

    The Project Management Institute (PMI), has stated that there will be a need for 87.7 million project managers by 2027 to meet business demands – and that our inability to meet the demand could result in $207.9 billion in GDP losses. By the same year, studies have shown that independent contractors are projected to become a majority of the workforce.

    Managing workers in the ‘Gig’ economy well is critical, enabling an organization to put the right talent in place where and when it is most needed – especially as talented full-time workers are harder to find and harder to keep.

    Attend and learn:
    •New strategies for resource allocating and planning, including a focus on the role, not the source, of the talent
    •How focusing on inclusion, diversity, and fairness is critical to weaving gig workers into your team
    •The four critical processes you must have in place to ensure success
    •Tactics needed to manage a new type of team
  • Your Processes Are Poor, and Now You Want to Automate Them?
    Your Processes Are Poor, and Now You Want to Automate Them?
    Josh Caid, Chief Evangelist, Cherwell Software Jun 20 2019 1:30 pm UTC 45 mins
    Garbage in, garbage out, or so the saying goes. If you get more efficient at garbage, then you too can have a bigger pile of garbage. Automation is an area where “work smarter, not harder” really comes into play. Let’s look at what some companies have done to avoid this.
  • Delivering Security Awareness That Works
    Delivering Security Awareness That Works
    Matt Sitelman, Mimecast; Shayla Treadwell, ECS Federal; Ashley Schwartau, Sec. Awa. Co.; Brandon Dunlap Jun 20 2019 5:00 pm UTC 60 mins
    All organizations wrestle with their security awareness programs. It is clear that users need to be part of the solution and not just part of the problem. Many users however see these programs as “gimmicks” and don’t take the training as seriously as the organization would like them to. Security managers are often putting out other fires and can’t devote the time they would like to ongoing awareness training. So what can be done to overcome these issues? Join Mimecast and (ISC)2 on June 20, 2019 at 1PM Eastern for a discussion on the do’s and don’ts of security awareness training and testing, why it’s important to customize training for different groups and how to truly engage your end-users to make them part of your security program. We will also provide tips for gaining management support and building a company-wide culture of security with training as a key component.
  • Cyberattacks: Q2 Review and Emerging Trends
    Cyberattacks: Q2 Review and Emerging Trends
    Kelvin Murray, Sr. Threat Research Analyst, Webroot Jun 25 2019 10:00 am UTC 60 mins
    With cybercriminals constantly innovating ways to steal information and monetise data, it’s crucial for businesses and MSPs to keep up to date on emerging cyber threat trends.

    Webroot is hosting a series of webinars every three months that aim to keep the industry informed on the latest threat trends and to review the top cyberattacks that hit businesses each quarter, as well as tips for staying safe in a complex threat landscape.

    Join Webroot as we discuss topics like:

    • Information theft and phishing attacks
    • Headline-grabbing breaches and the torrent of smaller ones that don't make the news
    • The evolution of ransomware
    • The theft, trade, and cracking of passwords
  • Live Demo: Proofpoint Security Awareness Training
    Live Demo: Proofpoint Security Awareness Training
    Sean Walker, Enterprise Account Executive Jun 25 2019 5:00 pm UTC 45 mins
    Engage your end users and arm them against real-world cyber attacks using personalized training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right training to the right people at the right time.
    Join us for a live demo of Proofpoint Security Awareness Training to see for yourself! 

    You'll learn how to: 
    - Assess your users’ susceptibility to phishing attacks and knowledge of cybersecurity beyond the phish
    - Deliver customized training to your end users to drive behavior change and make them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • Top 3 der Anwendungsfälle der IT-Automatisierung, die Menschen, Prozesse und Tec
    Top 3 der Anwendungsfälle der IT-Automatisierung, die Menschen, Prozesse und Tec
    Aria Naderi Jun 26 2019 8:30 am UTC 30 mins
    Die Automatisierung verändert die Art und Weise, wie wir arbeiten und leben. Von selbstfahrenden Autos bis hin zu KI-gesteuerten virtuellen Assistenten - jeder ringt nach dem neuesten Stand der Automatisierungstechnik.

    Der immense Druck auf digitalisierte Geschäftsabläufe lässt Unternehmen auf der Suche nach einer Prozessautomatisierung sein, die Genauigkeit und Geschwindigkeit verbessert und gleichzeitig die Kundenzufriedenheit verbessert.

    In diesem Webinar erleben Sie drei Anwendungsfälle der Prozessautomatisierung, die das Personal befreien, an produktiveren Projekten zu arbeiten, menschliche Fehler zu reduzieren und schneller und effizienter auf Vorfälle und Anfragen zu reagieren.
  • From Telephone to Telepathy – The Evolution of Digital Support
    From Telephone to Telepathy – The Evolution of Digital Support
    Weston Morris, Global Leader for Unisys Digital Workplace Services Jun 26 2019 3:00 pm UTC 60 mins
    Today’s enterprises need capabilities that go beyond the “Service Desk” and “Desktop Support.” Enterprises need capabilities that:

    •Start with how users devices are provisioned and configured so they are ready to ‘phone home’ when a problem is detected.
    •Include Artificial Intelligence and machine learning as inherent components of the digital workplace ecosystem.
    •Go beyond the visualization of device data to proactive resolution response.
    •Use intelligent analytics to infer how the end-users feel about their service without the hassle of a formal survey.

    Please join us as we profile seven clients’ use of our Digital Support innovations to accelerate digital transformation.
  • Why Your Vendors Are Your Biggest HIPAA Privacy Risk
    Why Your Vendors Are Your Biggest HIPAA Privacy Risk
    Kathleen Randall, EVP North America CISSP, CISA, GSNA and Ben Dalton, Senior Technical Consultant Jun 26 2019 4:00 pm UTC 60 mins
    In the past, healthcare organizations have paid lip service to HIPAA’s privacy requirements for third party vendors, or “business associates.” As data breaches and malware continue to cripple healthcare institutions, many are realizing that their weakest links may be out of their control and in their vendor’s hands. How can you be assured that your ePHI data is in safe hands? By asking the right questions. Industries like finance, insurance, energy have managed third party risk programs for years. In this webinar learn how industry best practices can be incorporated to not only meet HIPAA requirements but also give visibility to manage your external risk to your healthcare organization.

    The session will cover:
    • Managing the risk of your Business Associates (and the risk of their Business Associates)
    • Case Studies: Vendors as a common source of breaches
    • Before you sign off on the Business Associate Agreement, what you should be doing?
    • Work smarter, not harder: How to drive a cost-effective and OCR-compliant process.
  • The Gender Tipping Point: Women, Emotional Intelligence, and Leadership
    The Gender Tipping Point: Women, Emotional Intelligence, and Leadership
    Dr. Shawn Andrews Jun 26 2019 4:00 pm UTC 60 mins
    Dr. Shawn Andrews joins us to discuss gender equality and if the gender parity is attainable.

    Dr. Shawn Andrews is a keynote speaker, organizational consultant, business school professor, and best-selling author. She has research expertise in the areas of Leadership, Emotional Intelligence, Gender, Unconscious Bias, and Diversity & Inclusion. She addresses the current leadership gender gap, barriers to leadership, gender-specific emotional intelligence, and gender culture differences. She explains how each of these show up every day in the workplace, how they affect perception and promotion, and provides recommendations for individuals to improve career advancement, and for organizations to enhance diversity and inclusion.
  • Webisode 2: Strategic Cybersecurity Transformation - Why Now, Why People-Centric
    Webisode 2: Strategic Cybersecurity Transformation - Why Now, Why People-Centric
    Jinan Budge, Principal Analyst Security & Risk, Forrester; Ryan Kalember, SVP Cybersecurity Strategy, Proofpoint Jun 26 2019 5:00 pm UTC 66 mins
    Why is cybersecurity transformation critical right now, and what are the most effective frameworks for organizing change?

    Join guest Forrester speaker Jinan Budge and Proofpoint for an interactive discussion of the biggest challenges that today's CISOs face, and why a people-centric approach to security is necessary in today’s threat landscape.

    In this session, you'll learn:
    - How business transformation like the rise of Office 365 has driven cybersecurity transformation
    - Why you should pivot your transformation around people and culture, rather than infrastructure
    - 6 principles for successful cybersecurity transformation
  • EMEA Threat Landscape: Volumes, Focus, & Shifting Targets
    EMEA Threat Landscape: Volumes, Focus, & Shifting Targets
    Ed Rowley, Senior Technical Engineer and Dan MarleyCook, Team Lead, Sales Engineer Jun 27 2019 9:00 am UTC 45 mins
    2019 is the year where individuals in organisations are taking center stage in the cybersecurity threat landscape. Bad actors have shifted their strategies beyond perimeter and endpoint attacks and now look at high value individuals who have privileged access or handle sensitive data.

    While not everyone is a VIP, anyone can be a VAP (Very Attacked Person). In this webinar, we explore the shifts in the EMEA threat landscape in the first quarter of 2019, the threats targeting VAPs, and share ways in which organisations can protect identified VAPs from targeted attacks.
  • How NIST-CSF Can Help Your Organization Recover and Respond From An Incident
    How NIST-CSF Can Help Your Organization Recover and Respond From An Incident
    24by7Security, Inc Jun 27 2019 4:00 pm UTC 60 mins
    First rolled out in 2014 and updated to v1.1 in 2018, the NIST Cyber Security Framework has become widely known and used in the US and overseas. The NIST CSF sets down a framework of cyber security best practices that can be used by any organization, which also ties into many other frameworks, allowing it to be used alongside them.

    The NIST CSF has three components: the Core, Profile, and Tiers. The Core is the heart of the Framework, organizing activities into 5 functions: Identify, Protect, Detect, Respond, and Recover. These are divided into 23 categories, further divided into 108 subcategories, and these subcategories are cross referenced to several other frameworks and standards. The Profile is a way of setting a road map of activities, gathering an organization's current state, then setting down a desired future state. The Implementation Tiers are a way to clarify the organizations view of cyber security risk and its approach to addressing it.

    CPE/ CEU Credits: You may be eligible for CEUs or CPE credits at some professional associations by attending this webinar. Please check with your professional association and its policies to see if you may apply for CEUs or CPE credits for this webinar. You can download a certificate of completion from BrightTALK after viewing the entire webinar.
  • Webisode 1: 2019 FINRA and SEC Compliance
    Webisode 1: 2019 FINRA and SEC Compliance
    Raymond Mcgrath, Services, Supervision Policy Consultant; Roman Tobe, Manager, Product Marketing Jun 27 2019 5:00 pm UTC 56 mins
    Every year, FINRA and the SEC tell broker-dealers exactly what they perceive as heightened risks to the market and investors. In this way, regulators send a clear message of what to expect during exams in the coming year. As a compliance officer, this is the roadmap that sets the tone for your efforts for the rest of 2019 and beyond.

    Attend our first of four webisodes to learn how you can help your firm meet these and other regulatory challenges in the year ahead. Our industry experts will discuss some of the risks spotlighted for 2019:

    - Supervision of Digital Assets Business
    - Regulatory technology
    - Adequacy of firms’ cybersecurity programs to protect sensitive information
  • Modernise your System of Agreements
    Modernise your System of Agreements
    Jamie Corrigan Jul 4 2019 9:00 am UTC 19 mins
    Every organisation has a system of agreement process, from contracts to offer letters to purchase orders, agreements are the foundation of doing business. Yet many organisations still rely on manual, disconnected processes costing the business time, money and increasing errors and risk.

    To modernise and unify their systems of agreement, organisations are adopting the DocuSign Agreement Cloud. Most start with DocuSign eSignature, then connect and automate other parts of the agreement process to more than a dozen applications and more than 350 integrations that covere the entire agreement process, from preparing to signing, acting on, and managing agreements.

    At each step, the result is the ability to do business faster, simpler, greener, and more cost-efficiently, while delivering a better experience for customers, partners, and employees.

    Join this live webinar and see how you can automate your agreement processes before, during and after eSignature. You will learn to:

    - Prepare agreements with a high degree of automation
    Sign Agreements quickly and securely and complete the process faster with automated routing
    - Act on agreement terms after signing and update records or trigger actions in other systems
    - Manage agreements and leverage features like secure retention, retrieval, and reporting
  • The Top Cyber Threats Today and How to Protect against Them
    The Top Cyber Threats Today and How to Protect against Them
    Tyler Moffitt, Sr. Threat Research Analyst, Webroot Jul 9 2019 3:00 pm UTC 60 mins
    The year 2018 and the first half of 2019 saw a significant number of major events showcasing cybercriminal innovation. We saw cryptojacking and botnets reach their most widespread, ransomware become more targeted, and phishing attacks transition their focus from financial to tech targets.

    Webroot believes it's possible to effectively protect businesses and clients, but only by understanding the adversary and the techniques they use.

    In this webinar, Webroot threat analyst Tyler Moffitt will offer insights into prevailing malware trends and tactics, and discuss how implementing a layered security strategy can help you protect your clients from multi-pronged attacks.

    We hope you can join us for this live, educational session.
  • How pharma marketing can stay ahead of the evolving customer journey
    How pharma marketing can stay ahead of the evolving customer journey
    Robb DeFilippis, Managing Director, Life Sciences, Tag, Steve Pitts, Business Director, Tag, Dominic Tyer, pharmaphorum Jul 9 2019 3:00 pm UTC 75 mins
    Customer journeys in pharma are changing, with important implications for the marketing supply chain. How can pharmaceutical marketers capitalise on this trend and free up budget to invest in additional marketing channels?

    New developments in data and digital are changing traditional customer journeys and forcing pharmaceutical companies to evolve in order to keep up.

    Companies like Apple and Amazon have elevated customer expectations for personalised content and interactions across multiple channels, in the process setting new standards for marketing. But, as they push the envelope, what are the implications for pharma’s work in customer engagement?

    This pharmaphorum webinar, in association with Tag, will examine the challenges that pharma marketing faces to stay ahead of the evolving customer journey and offer expert insight from both the pharma and FMCG sectors on how to convert these challenges into opportunities .

    The expert panel will consider exclusive research carried out by Tag and pharmaphorum across the US, Europe and Asia-Pacific among senior decision-makers in pharma and FMCG marketing.

    The webinar, which takes place on Tuesday 9th July at 16:00 BST , will also look at:
    •How pharma currently allocates its marketing budgets
    •Where marketers would like to have more money to invest
    •How much time is spent directing creative ideation and managing marketing production
  • State of the Phish 2019: How to Stop Attackers That Are Phishing Your End-users
    State of the Phish 2019: How to Stop Attackers That Are Phishing Your End-users
    Paul Down, Senior Director Proofpoint Security Awareness Training Jul 10 2019 3:30 am UTC 38 mins
    As phishing attacks continue to make global headlines, become more sophisticated and bypass traditional email security gateways; we need to empower our workforce to be aware and ready to detect them alongside the technology.

    Our fifth annual, 2019 State of the Phish Report explores this evolving threat landscape, offering insights drawn from tens of millions of simulated phishing attacks and our global survey of 15,000 infosec professionals over the last 12 months.

    Join Paul Down, Senior Director, Proofpoint Security Awareness Training as he discusses the key findings from our latest 2019 State of the Phish report. You'll learn:

    - How to build a people centric security strategy

    - Steps organizations are taking to mitigate end-user risk from phishing

    - The most devastating types of phishing emails

    - The most vulnerable industries and departments
  • How to Make Your Messages Stick!
    How to Make Your Messages Stick!
    Cathy McNally Jul 10 2019 4:00 pm UTC 60 mins
    Cathy McNally joins us to discuss public speaking techniques and how to make your messages stand out to your audience!

    Cathy McNally has been making people laugh and helping them learn (usually at the same time) for nearly 20 years. Cathy brings her background as a comic and her expertise in powerful communication to create fun, interactive, and highly effective workshops, coaching, and keynotes.
  • Railinc: Best Practices for Deploying and Adopting an Intelligent Data Catalog
    Railinc: Best Practices for Deploying and Adopting an Intelligent Data Catalog
    Ramesh Veerappan,Shawn Petway,Khuan Tan, Dharma Kuthanur Jul 10 2019 5:00 pm UTC 58 mins
    As Railinc modernizes its data infrastructure, critical data has become distributed across Oracle, data lake and tools like SAS, and business users have been challenged to find and understand the data they need. Railinc embarked on a major effort across business & IT to address this problem by cataloging all data assets and adding business context to the data to enable easy search and discovery. Confidence in the data was improved through visibility into how datasets were created and business descriptions and tags that added business context, along with a focused/phased approach to drive business user adoption. Railinc will share valuable lessons and best practices related to both: (1) deployment and scaling; (2) driving business user adoption.
  • Webisode 3: Email Fraud - Case Studies & Defense Strategies w/ US Secret Service
    Webisode 3: Email Fraud - Case Studies & Defense Strategies w/ US Secret Service
    Ryan Terry, Product Marketing, Proofpoint & Stephen Dougherty, Financial Investigator, US Secret Service Jul 10 2019 5:00 pm UTC 73 mins
    Email fraud is one of today's most common – and most costly – cyber threats. It’s also the most effective means to infiltrate just about any company. There are many ways the bad guys go about compromising the network and getting what they want: spear phishing, BEC / CEO fraud attacks, W2 scam, ransomware… the list goes on and on.

    What’s the best way to defend your organization from business email compromise (BEC) and other email spoofing attacks?

    Join our experts, Ryan Terry, Manager, Product Marketing from Proofpoint and Stephen Dougherty, Contractor - Financial Investigator from the United States Secret Service - Global Investigative Operations Center (GIOC), for a deep dive into real world email fraud examples and a discussion of best practice defense strategies.

    We’ll share:

    - Common identity deception tactics cyber criminals use to target your employees, business partners, and customers
    - How fraudsters use social engineering to reach the right person at the right time
    - How to identify and stop email fraud attacks before they reach the inbox
  • How icare built a digital insurance platform
    How icare built a digital insurance platform
    Ed Lee, Technical Director at icare and Dan Owen, Director, Customer Success Architecture at MuleSoft Jul 11 2019 4:00 pm UTC 59 mins
    In this webinar, icare will share how they were able to create from scratch Australia's largest public sector self-insurer in just three years. Using an API-led approach to integration, they overcame the 'gravity' of legacy systems to move to the cloud and deliver patient-centric outcomes efficiently and fast.

    Join this webinar to learn how to:
    - De-risk legacy modernisation initiatives using APIs.
    - Decouple systems and data to build a future-proof cloud architecture that supports ongoing change.
    - Unlock data in machine-learning systems and support automated business process decisions.
  • Webisode 2: On-Premises Archives - A Breach Waiting To Happen?
    Webisode 2: On-Premises Archives - A Breach Waiting To Happen?
    Martin Tuip - Senior Information Archive Strategist Jul 11 2019 5:00 pm UTC 47 mins
    The world is changing and so are the targets cyber criminals are going after. On-premises archiving solutions have been around for almost 2 decades but there also come these days with some inherit increasing risks. What do these risks look like and what can you do to defend against them?

    Join this second of four webisodes to learn about:

    - Why cyber criminals might be targeting your archive
    - The top security risks of on-premises archives
    - How to reduce your risk
  • Making Stopping Phishing Your #1 Priority
    Making Stopping Phishing Your #1 Priority
    George Anderson, Director of Product Marketing, Webroot Jul 16 2019 3:00 pm UTC 60 mins
    Phishing is flying under most organisations radar. Yet more than nine of 10 successful security breaches start with a phish.

    Phishing takes many forms and is constantly adapting and morphing to become harder to detect and therefore harder to stop. We used to talk about polymorphic malware, but we now live in the age of polymorphic phishing.

    This webinar looks at the real threat that poses and defenses you can use to mitigate its effects on profitability.