Thousands of healthcare IT professionals compose the health IT community on BrightTALK. Learn alongside them with relevant webinars on healthcare IT compliance, big data in healthcare and IT solutions for healthcare organizations. Join the conversation by asking questions and engaging with other participants during live webinars and organized discussions.
Roger Grimes, Scott LoweRecorded: Jun 14 201959 mins
It’s common knowledge that humans are the leading cause of IT security incidents. Whether accidental or intentional, a human-centric root cause lies at the center of literally every security incident.
You can’t just eliminate all the humans, so security professionals are left to find reasonable measures to ensure that the human element of their organizations can act as a bulwark of security rather than as a catalyst for disaster. This is easier said than done and requires constant vigilance.
Human security is not a “one and done” effort. It’s an ongoing process often including automated security awareness training and simulated phishing. How do you make it happen? What steps can you take to get there? What are the real problems that need to be solved? Most importantly, do your employees really understand their critical role in protecting your organization?
Email is still the #1 attack vector the bad guys use. A whopping 91% of cyberattacks start with a phishing email, but email hacking is much more than phishing and launching malware!
Join Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist and security expert with over 30-years of experience, for this webinar where he will explore 10 ways hackers use social engineering to trick your users into revealing sensitive data or enabling malicious code to run. Plus, he'll share a (pre-filmed) hacking demo by KnowBe4's Chief Hacking Officer Kevin Mitnick.
Roger will teach you:
•How silent malware launches, remote password hash capture, and how rogue rules work
•Why rogue documents, establishing fake relationships and getting you to compromise your ethics are so effective
•Details behind clickjacking and web beacons
•Actionable steps on how to defend against them all
If all you were worried about were phishing attempts, think again!
Augie Gonzalez, Director of Product Marketing, DataCoreRecorded: Jun 13 201945 mins
Every master plan is created to fulfill specific demands. But what if you did not consider one or two unpredictable factors? This webinar will provide insights to help you maintain business continuity by adapting to those inevitable, yet unforeseen turn of events.
- Find out where your organization ranks within the Vulnerability Index
- How to protect your BC/DR plans and avoid common storage pitfalls
- Discover the new standard of BC/DR planning and stay future-ready
Robert Kreuscher, Solution Architect - Professional Services. Martin Tuip, Sr. Product Marketing ManagerRecorded: Jun 13 201959 mins
Join this webinar for an interactive discussion about the need for cross-departmental alliances, and best practices for joining efforts and technology across your organization.
- How evolving regulations and compliance technology will impact IT
- How IT can help with your organization's compliance strategy
- How new RegTech can improve compliance readiness while also improving IT value to an organization
Brian Robison, BlackBerry Cylance; Eric Walters, Burns & McDonnell; Travis Farral, CISO, LEO Cyber Security; B. DunlapRecorded: Jun 13 201959 mins
The historical evidence of rules-based solutions in the Endpoint Detection and Response (EDR) has proven that this approach is unable to keep up with the speed of the shifting threatscape. Join BlackBerry Cylance and (ISC)2 on June 13, 2019 at 1:00PM Eastern where we will explore how machine learning and artificial intelligence are closing the OODA (observe–orient–decide–act) loop on the attackers. We’ll also examine how you can gain an advantage over emerging threats, your time to respond and impact of artificial intelligence on security professionals.
Peter Meeus, European Orphan Medicines, Sarah Rickwood, IQVIA, Angela McFarlane, IQVIA, Paul Tunnah, pharmaphorumRecorded: Jun 13 201972 mins
Launching orphan medicines excellently will become even more important over the next five years as more patients with rare diseases have pharmacotherapies available.
There are also a growing number of disease-focussed registries, increasing public and policy maker awareness, and significant R&D investment in orphan drugs, as well as in digital technologies to support trials and treatment.
But a new frontier of challenge faces orphan medicines companies as the gap between orphan medicines and mainstream specialty products narrows.
To understand how to succeed in launching an orphan medicine in the coming years, companies must learn from past launches and apply an orphan medicines-focused launch excellence framework for success.
This internationally relevant webinar will provide US and European examples to illustrate the ways in which the pharmaceutical market for orphan medicines is changing and how, consequently, launch strategies must evolve.
This pharmaphorum debate, held in partnership with IQIVA, will also look at how pharmaceutical companies can optimise all the activities needed to take orphan medicines from clinical development to commercialisation, including:
•Identifying the three fundamental challenges for orphan medicine launch excellence
•Discussing the ways in which companies launching orphan medicines can learn from excellence in mainstream launches
•Examining, in-depth, the specific areas of focus which are crucial for orphan medicines excellence.
Patrick Wheeler, Director of Threat Intelligence, ProofpointRecorded: Jun 12 201951 mins
This year, a shakeout in the cryptocurrency market will change the way threat actors move -- and steal -- money, while email fraud moves from spoofing identities to using stolen identities. These are just some of the tactics bad actors will use in 2019.
Every year Proofpoint researchers look ahead at the trends and events likely to shape the threat landscape in the year to come. Join us as we discuss:
- Predictions for the 2019 threat landscape
- Key actions you can take to prepare your organization
- Top resources to help support your security efforts
The California Consumer Privacy Act (CCPA) is the first major U.S. privacy law to unfold. This law has interested other states in following suit, which may soon call for a national U.S. Privacy Law. Organizations are uncertain how to comply with CCPA, which takes effect January 1, 2020.
In this live webinar, Lockpath’s Sam Abadir will share what preparation for CCPA compliance entails, including:
• Protecting consumer data
• Applying technology to processes
• Managing multiple channels for consumers exercising their rights
• Ensuring a fast response to breaches
• Requirements of CCPA
• Strategic approach to CCPA
• Best practices for managing CCPA
• Best practices for responding to privacy incidents
As an attendee you’ll learn how to approach CCPA to prepare yourself for the new law in 2020 and set the foundation for other privacy laws as they impact your organization. Register now!
Robert Principe joins us for a fireside chat to discuss The Diversity Dividend – when diversity and inclusion become a key enabler of growth and makes a positive impact to a company’s financial performance.
Robert Principe has guided organizations for over 25 years to address the challenges of defining and implementing effective diversity and inclusion strategy (D&I). Robert’s background includes 13 years as a Diversity and Inclusion (D&I) Manager. In this capacity, he had direct responsibility for the full scope of diversity and inclusion work including assessment of organizational culture, strategic planning, support for professionals of color and the LGBTQ population, and the design and facilitation of all diversity and inclusion training and programming. Robert’s development of “10 Steps for White Men to Become Better Allies for Diversity and Inclusion” is a direct result of his own D&I journey as a white, cisgender, heterosexual male as well as from years of gathering data facilitating white male D&I focus groups.
Mike Jude (Moderator), Frost & Sullivan Digital Health ExpertsRecorded: Jun 11 201956 mins
Are you curious about how Digital Health will change through the end of 2020? Are you looking for new growth opportunities to capitalize on now to ensure a successful future?
We invite you to attend the complimentary webinar, Digital Health Predictions and Trends—What to Expect in 2020, moderated by Mike Jude, Ph.D., Research Manager, along with our Digital Health experts. They will provide expert insight and predictions on new developments poised to help you build a growth pipeline. Insights will be based on the likely impact of technologies such as AI, Big Data, predictive analytics, and telemedicine, as well as evolving areas such as new billing practices and Femtech. Learn about real-world success stories as well as potential mistakes you must avoid.
• Learn what the digital health market potential is through 2020
• Better understand which technologies and services will be the primary industry drivers in the short term
• Identify growth opportunities in digital health
• Explore the impact of new technologies and regulations on market potential
• Gain insight on new approaches to achieve more efficient management of the healthcare process
David Loshin, TDWI Deepa Sanker, InformaticaRecorded: Jun 9 201961 mins
As the volume of data across enterprises continues to grow exponentially, organizations are looking to cloud data warehouses for scalability, flexibility at lower costs. But moving to a cloud data warehouse requires planning and a strategic approach.
In this upcoming webinar, join David Loshin from TDWI along with Deepa Sankar and Nassir Khan from Informatica for a discussion of best practices to achieve faster time-to-value from cloud data warehousing.
- Economic benefits of cloud data warehousing
- Core capabilities for modernizing your data warehouse in the cloud
- Why a comprehensive integration platform as a service (iPaaS) plays a key role in success
Robert Dobson, Device Authority and Jon Hill, InVMARecorded: Jun 6 201950 mins
Sign up to this webinar to learn:
- How to connect your devices
- Challenges of securing devices, applications and data, and how to overcome them
- Real world examples of secure connected devices for Industrial and Healthcare
IoT adoption has increased in recent years due to the benefits gained by organizations in almost every industry, just by connecting their devices to the internet. Connected sensors, actuators and edge nodes enable companies to pick up on inefficiencies and problems sooner and save time and money while supporting business intelligence efforts.
In manufacturing specifically, IIoT holds great potential for quality control, sustainable and green practices, supply chain traceability and overall supply chain efficiency. In an industrial setting, IIoT is key to processes such as predictive maintenance, enhanced field service, energy management and asset tracking.
The IoT has the potential to create a world where billions of devices can connect and communicate seamlessly. But bridging the gap between the digital and physical has proven harder than expected. Most deployments were brownfield and required technological, architectural, and organizational integration with legacy solutions.
In addition, Security has turned out to be one of the greatest barriers to widespread IoT adoption. The good news is that we’ve come to recognize a secure by design approach as the most viable security option for organizations in IIoT, healthcare and smart connected products. Security architectures must be flexible and allow for multi-vendor collaboration. Ultimately, a security solution which prevents and protects against security attacks is better than a detect and respond method which many traditional IT security vendors offer today.
Darren Thomson, Symantec | David Boda, Camelot Group | George Patsis, Obrela Security Industries | Martin Mackay, ProofpointRecorded: Jun 5 201943 mins
Today's CISO faces a myriad of challenges when it comes to securing the enterprise. From budgetary concerns and vendor confusion to dealing with the chronic lack of cyber talent, to addressing the disappearing security perimeter, CISOs are looking for ways to automate security operations and leverage AI to do more with existing teams and fewer tools.
Join security experts across the industry for an interactive discussion on:
- What keeps CISOs up at night
- Strategies for breach prevention
- Strategies for making the most of AI technology and human talent
- Coping with analyst fatigue
- Threats on the horizon
- Recommendations for strengthening security
David Boda, CISO, Camelot Group
Darren Thomson, CTO - EMEA, Symantec
George Patsis, CEO, Obrela Security Industries
Martin Mackay, Senior Vice President - EMEA, Proofpoint
Moderated by Yotam Gutman, Founder & Community Manager, Cybersecurity Marketing Community
Leighton James, CTO at UKCloudRecorded: Jun 5 201918 mins
You’ve spent years developing a great application based on a unique domain expertise that addresses a particular niche. But the market is changing, new software providers are driving competition and customers no longer want to be responsible for software on-premises and want to consume it as a service, where you become responsible for the hosting, infrastructure and more flexible commercial model. So how do you take on this added burden and continue to deliver great solutions?
Join our CTO Leighton James as he answers this question, guiding you through:
- How Cloud is transforming the software business & enabling new opportunities
- What SAAS is and why it matters to your customers
- The growing opportunity for specialist software across UK Public Sector
- Where to start and how UKCloud can help
Fiona Challis, Channel Enablement & Sales Expert, Next GenRecorded: Jun 4 201941 mins
CompTIA explores the forces shaping the IT industry, its workforce, and its business models in 2019. Some of the trends we’re monitoring and will discuss include:
• How the cloud, edge computing, and 5G form modern economic infrastructure
• How IoT and AI are opening new doors for ambient computing
• How distributed technology models challenge existing structures
• How the business of emerging technology prompts sales channels’ reinvention
• How partnerships are bridging gaps in the new tech ecosystem
• How persistent tech personnel shortages are fueling new, creative staffing solutions
• How global tech hubs shine the spotlight on the ingredients for innovation
Ever wonder how hackers, spies, and con-artists gather such detailed and convincing intel on their targets? Kevin Mitnick, the world's most famous hacker and KnowBe4's Chief Hacking Officer, knows. And he'll share those secrets with you on this upcoming webinar. Register at: https://event.on24.com/wcc/r/1987306/120DACBD77DBFB3669AC398388105E40?partnerref=BrightTALK
Gabriele Roberti and Andrea SivieroRecorded: May 30 201930 mins
Innovation Accelerators such as Artificial Intelligence, Internet of Things, Augmented & Virtual Reality and other emerging technologies are drawing unique opportunities and challenges across European vertical markets, with multiple digital use cases unlocking new technology scenarios for companies.
In this IDC web conference Gabriele Roberti and Andrea Siviero from the IDC European Customer Insights & Analysis team will discuss the combination of these emerging technologies and the leading disruptive use cases across European industries, such as professional services, retail, healthcare and others, answering questions such as:
Join Cherwell for a webinar outlining the top considerations for implementing automation within the IT and service desk environment. As businesses look to streamline processes, there are several ‘quick wins’ to enhance efficiency within existing IT workflows—removing the need for resources to manage common, repetitive tasks, and allowing greater focus on higher value activities.
In this session we’ll discuss:
•Why should you automate workflows and processes within the IT service desk
•What is are the most common IT(SM) automation use cases?
•How to get started with automation, and demonstrate early—and impressive!—wins
This webinar is an introductory-level discussion, and is the first in a series of webinars covering various topics around IT automation.
Laura Foley, Cheater of Death by PowerPointRecorded: May 29 201962 mins
You’ve sat through boring presentations with terrible slides. But what makes these slides so hard to look at? And what can be done to improve them? Attend this webinar and learn about common slide design mistakes how to fix them. You’ll learn how the Analyze and Synthesize technique can be used to redesign problem presentations. At the end of this webinar, you’ll have a better understanding of how to create presentations that are simple, easy to understand and compelling!
Tim Lawrence, UKCloud & Mark Melvin, Shaping CloudRecorded: May 29 201919 mins
So you’ve decided you’d like to reap the benefits of Data Centre Modernisation, reducing costs, increasing your operational agility and spending more time focusing on your core business. But you may be left wondering what you need to do, what approaches you can take and some of the key pitfalls to avoid.
Without a coherent plan, your use of cloud is tactical and piecemeal. It’s difficult to keep control of these new cloud services whilst also keeping your existing IT afloat. In effect things are getting worse and you need them to get better.
That’s why here at UKCloud we have our Professional Services team – a handpicked group of our experienced multi-cloud experts who can make the process of creating a pragmatic, business-led and coherent cloud adoption plan a breeze.
Learn more by registering for our upcoming webinar, hosted by Cloud Transformation expert, Tim Lawrence and joined by Mark Melvin from Shaping Cloud, will guide you through this process and help you begin your transformation journey with confidence.
*How cloud is not the answer to everything.
*Why the strategy and business case are critical to get the outcome you are looking for.
*Customer Case Study.
*An overview of how cloud assessments are performed.
Everyone knows that multi-factor authentication (MFA) is more secure than a simple login name and password, but too many people think that MFA is a perfect, unhackable solution. It isn't!
Join Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist, and security expert with over 30-years experience, for this webinar where he will explore 12 ways hackers can and do get around your favorite MFA solution.
The webinar includes a (pre-filmed) hacking demo by KnowBe4's Chief Hacking Officer Kevin Mitnick, and real-life successful examples of every attack type. It will end by telling you how to better defend your MFA solution so that you get maximum benefit and security.
You'll learn about the good and bad of MFA, and become a better computer security defender in the process, including:
- 12 ways hackers get around multi-factor authentication
- How to defend your multi-factor authentication solution
- The role humans play in a blended-defense strategy
Brandon Levene, Head of Applied Intelligence; Chronicle; Brandon Dunlap (Moderator)Recorded: May 24 201959 mins
Get a deeper look into malware campaigns using VirusTotal's newest tools. Learn from the expert how to use the platform and how best to leverage the data available to you and your security team. By better understanding the breadth and depth of malicious campaigns, researchers can better investigate and mitigate impact. Recently introduced improved relational metadata as well as expanded retroactive and proactive hunting capabilities allow investigators to dive deep into malware within a global data source.
Does your organization successfully communicate risk across departments? Or does essential information get lost in translation? Effective communication is the ‘glue’ for a successful risk management program. Making sure every part of an organization is on the same page can be challenging when language changes from department to department.
In this can’t miss webinar, Lockpath’s, Dennis Keglovits will share his experience with communicating risk successfully across an organization, from the IT department to the executive suite.
As an attendee you’ll learn:
• Key concepts for standardizing your risk language
• Options for establishing better lines of communications
• Better communication leads to better collaboration
Tyler Moffitt, Sr. Threat Research Analyst, WebrootJun 18 20193:00 pmUTC60 mins
Recent years has seen a move towards more targeted attacks, especially in the realm of ransomware. Attackers are no longer trying to infect the globe, choosing instead to carefully select targets to increase their chances of success and maximise payouts.
SMBs find themselves in the crosshairs of these attacks. Their defense and contingency plans often leave them vulnerable to ransomware, information theft, and other attacks.
Is your organisation a soft target? Automated processes can often determine this in a matter of minutes, and cybercriminals are aware.
Learn how to lift your organisation from easy target to robustly defended with learnings from this webinar.
Pierre-Andre AeschlimannJun 19 20198:30 amUTC45 mins
Die Digitalisierung verursacht eine radikale Umgestaltung von Unternehmen und sogar ganzer Branchen. Es ist eine radikale Umformung der Interaktion zwischen Kunden und Unternehmen aber auch, immer wichtiger, zwischen Mitarbeiter und deren Unternehmen. Die Rolle der IT ist strategischer als je zuvor. Ein unternehmensweiter Service Management Ansatz hat sich als der beste Ausgangspunkt gezeigt.
In diesem Kontext werden wir folgende Themen und deren Wichtigkeit erklären:
•Wie verwalte ich Services effizient quer durch das ganze Unternehmen (IT, HR, Security, Facilities, Marketing, Customer Service,...) ?
•Wie automatisiere ich die dazugehörenden Prozesse oder Arbeitsabläufe intelligent und einfach?
•Wie ermögliche ich meinen Kunden und Mitarbeitern eine moderne, intuitive und immersive Erfahrung/Erlebniss/Experience, und warum ist ganz speziell die Employee Experience so wichtig?
•Das Ganze illustriert durch Fallbeispiele von Kunden aus dem deutschsprachigen Raum (DACH)
Our economy is on fire! The latest numbers here in the U.S. show that companies added 263,000 jobs in April alone. And unemployment is down to 3.6%, which is the lowest since 1969. All of this growth and opportunity has companies struggling to hire the talent they need – and so they are turning to consultants and freelancers, those making up the Gig economy. Studies are showing that the need for supplementing their workforce will not slow down – especially in the area of project management.
The Project Management Institute (PMI), has stated that there will be a need for 87.7 million project managers by 2027 to meet business demands – and that our inability to meet the demand could result in $207.9 billion in GDP losses. By the same year, studies have shown that independent contractors are projected to become a majority of the workforce.
Managing workers in the ‘Gig’ economy well is critical, enabling an organization to put the right talent in place where and when it is most needed – especially as talented full-time workers are harder to find and harder to keep.
Attend and learn:
•New strategies for resource allocating and planning, including a focus on the role, not the source, of the talent
•How focusing on inclusion, diversity, and fairness is critical to weaving gig workers into your team
•The four critical processes you must have in place to ensure success
•Tactics needed to manage a new type of team
Josh Caid, Chief Evangelist, Cherwell SoftwareJun 20 20191:30 pmUTC45 mins
Garbage in, garbage out, or so the saying goes. If you get more efficient at garbage, then you too can have a bigger pile of garbage. Automation is an area where “work smarter, not harder” really comes into play. Let’s look at what some companies have done to avoid this.
Matt Sitelman, Mimecast; Shayla Treadwell, ECS Federal; Ashley Schwartau, Sec. Awa. Co.; Brandon DunlapJun 20 20195:00 pmUTC60 mins
All organizations wrestle with their security awareness programs. It is clear that users need to be part of the solution and not just part of the problem. Many users however see these programs as “gimmicks” and don’t take the training as seriously as the organization would like them to. Security managers are often putting out other fires and can’t devote the time they would like to ongoing awareness training. So what can be done to overcome these issues? Join Mimecast and (ISC)2 on June 20, 2019 at 1PM Eastern for a discussion on the do’s and don’ts of security awareness training and testing, why it’s important to customize training for different groups and how to truly engage your end-users to make them part of your security program. We will also provide tips for gaining management support and building a company-wide culture of security with training as a key component.
Kelvin Murray, Sr. Threat Research Analyst, WebrootJun 25 201910:00 amUTC60 mins
With cybercriminals constantly innovating ways to steal information and monetise data, it’s crucial for businesses and MSPs to keep up to date on emerging cyber threat trends.
Webroot is hosting a series of webinars every three months that aim to keep the industry informed on the latest threat trends and to review the top cyberattacks that hit businesses each quarter, as well as tips for staying safe in a complex threat landscape.
Join Webroot as we discuss topics like:
• Information theft and phishing attacks
• Headline-grabbing breaches and the torrent of smaller ones that don't make the news
• The evolution of ransomware
• The theft, trade, and cracking of passwords
Sean Walker, Enterprise Account ExecutiveJun 25 20195:00 pmUTC45 mins
Engage your end users and arm them against real-world cyber attacks using personalized training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right training to the right people at the right time.
Join us for a live demo of Proofpoint Security Awareness Training to see for yourself!
You'll learn how to:
- Assess your users’ susceptibility to phishing attacks and knowledge of cybersecurity beyond the phish
- Deliver customized training to your end users to drive behavior change and make them a stronger last line of defense
- Enable your employees to report suspicious messages with a single mouse click
Die Automatisierung verändert die Art und Weise, wie wir arbeiten und leben. Von selbstfahrenden Autos bis hin zu KI-gesteuerten virtuellen Assistenten - jeder ringt nach dem neuesten Stand der Automatisierungstechnik.
Der immense Druck auf digitalisierte Geschäftsabläufe lässt Unternehmen auf der Suche nach einer Prozessautomatisierung sein, die Genauigkeit und Geschwindigkeit verbessert und gleichzeitig die Kundenzufriedenheit verbessert.
In diesem Webinar erleben Sie drei Anwendungsfälle der Prozessautomatisierung, die das Personal befreien, an produktiveren Projekten zu arbeiten, menschliche Fehler zu reduzieren und schneller und effizienter auf Vorfälle und Anfragen zu reagieren.
Weston Morris, Global Leader for Unisys Digital Workplace ServicesJun 26 20193:00 pmUTC60 mins
Today’s enterprises need capabilities that go beyond the “Service Desk” and “Desktop Support.” Enterprises need capabilities that:
•Start with how users devices are provisioned and configured so they are ready to ‘phone home’ when a problem is detected.
•Include Artificial Intelligence and machine learning as inherent components of the digital workplace ecosystem.
•Go beyond the visualization of device data to proactive resolution response.
•Use intelligent analytics to infer how the end-users feel about their service without the hassle of a formal survey.
Please join us as we profile seven clients’ use of our Digital Support innovations to accelerate digital transformation.
Kathleen Randall, EVP North America CISSP, CISA, GSNA and Ben Dalton, Senior Technical ConsultantJun 26 20194:00 pmUTC60 mins
In the past, healthcare organizations have paid lip service to HIPAA’s privacy requirements for third party vendors, or “business associates.” As data breaches and malware continue to cripple healthcare institutions, many are realizing that their weakest links may be out of their control and in their vendor’s hands. How can you be assured that your ePHI data is in safe hands? By asking the right questions. Industries like finance, insurance, energy have managed third party risk programs for years. In this webinar learn how industry best practices can be incorporated to not only meet HIPAA requirements but also give visibility to manage your external risk to your healthcare organization.
The session will cover:
• Managing the risk of your Business Associates (and the risk of their Business Associates)
• Case Studies: Vendors as a common source of breaches
• Before you sign off on the Business Associate Agreement, what you should be doing?
• Work smarter, not harder: How to drive a cost-effective and OCR-compliant process.
Dr. Shawn Andrews joins us to discuss gender equality and if the gender parity is attainable.
Dr. Shawn Andrews is a keynote speaker, organizational consultant, business school professor, and best-selling author. She has research expertise in the areas of Leadership, Emotional Intelligence, Gender, Unconscious Bias, and Diversity & Inclusion. She addresses the current leadership gender gap, barriers to leadership, gender-specific emotional intelligence, and gender culture differences. She explains how each of these show up every day in the workplace, how they affect perception and promotion, and provides recommendations for individuals to improve career advancement, and for organizations to enhance diversity and inclusion.
Jinan Budge, Principal Analyst Security & Risk, Forrester; Ryan Kalember, SVP Cybersecurity Strategy, ProofpointJun 26 20195:00 pmUTC66 mins
Why is cybersecurity transformation critical right now, and what are the most effective frameworks for organizing change?
Join guest Forrester speaker Jinan Budge and Proofpoint for an interactive discussion of the biggest challenges that today's CISOs face, and why a people-centric approach to security is necessary in today’s threat landscape.
In this session, you'll learn:
- How business transformation like the rise of Office 365 has driven cybersecurity transformation
- Why you should pivot your transformation around people and culture, rather than infrastructure
- 6 principles for successful cybersecurity transformation
Ed Rowley, Senior Technical Engineer and Dan MarleyCook, Team Lead, Sales EngineerJun 27 20199:00 amUTC45 mins
2019 is the year where individuals in organisations are taking center stage in the cybersecurity threat landscape. Bad actors have shifted their strategies beyond perimeter and endpoint attacks and now look at high value individuals who have privileged access or handle sensitive data.
While not everyone is a VIP, anyone can be a VAP (Very Attacked Person). In this webinar, we explore the shifts in the EMEA threat landscape in the first quarter of 2019, the threats targeting VAPs, and share ways in which organisations can protect identified VAPs from targeted attacks.
First rolled out in 2014 and updated to v1.1 in 2018, the NIST Cyber Security Framework has become widely known and used in the US and overseas. The NIST CSF sets down a framework of cyber security best practices that can be used by any organization, which also ties into many other frameworks, allowing it to be used alongside them.
The NIST CSF has three components: the Core, Profile, and Tiers. The Core is the heart of the Framework, organizing activities into 5 functions: Identify, Protect, Detect, Respond, and Recover. These are divided into 23 categories, further divided into 108 subcategories, and these subcategories are cross referenced to several other frameworks and standards. The Profile is a way of setting a road map of activities, gathering an organization's current state, then setting down a desired future state. The Implementation Tiers are a way to clarify the organizations view of cyber security risk and its approach to addressing it.
CPE/ CEU Credits: You may be eligible for CEUs or CPE credits at some professional associations by attending this webinar. Please check with your professional association and its policies to see if you may apply for CEUs or CPE credits for this webinar. You can download a certificate of completion from BrightTALK after viewing the entire webinar.
Raymond Mcgrath, Services, Supervision Policy Consultant; Roman Tobe, Manager, Product MarketingJun 27 20195:00 pmUTC56 mins
Every year, FINRA and the SEC tell broker-dealers exactly what they perceive as heightened risks to the market and investors. In this way, regulators send a clear message of what to expect during exams in the coming year. As a compliance officer, this is the roadmap that sets the tone for your efforts for the rest of 2019 and beyond.
Attend our first of four webisodes to learn how you can help your firm meet these and other regulatory challenges in the year ahead. Our industry experts will discuss some of the risks spotlighted for 2019:
- Supervision of Digital Assets Business
- Regulatory technology
- Adequacy of firms’ cybersecurity programs to protect sensitive information
Every organisation has a system of agreement process, from contracts to offer letters to purchase orders, agreements are the foundation of doing business. Yet many organisations still rely on manual, disconnected processes costing the business time, money and increasing errors and risk.
To modernise and unify their systems of agreement, organisations are adopting the DocuSign Agreement Cloud. Most start with DocuSign eSignature, then connect and automate other parts of the agreement process to more than a dozen applications and more than 350 integrations that covere the entire agreement process, from preparing to signing, acting on, and managing agreements.
At each step, the result is the ability to do business faster, simpler, greener, and more cost-efficiently, while delivering a better experience for customers, partners, and employees.
Join this live webinar and see how you can automate your agreement processes before, during and after eSignature. You will learn to:
- Prepare agreements with a high degree of automation
Sign Agreements quickly and securely and complete the process faster with automated routing
- Act on agreement terms after signing and update records or trigger actions in other systems
- Manage agreements and leverage features like secure retention, retrieval, and reporting
Tyler Moffitt, Sr. Threat Research Analyst, WebrootJul 9 20193:00 pmUTC60 mins
The year 2018 and the first half of 2019 saw a significant number of major events showcasing cybercriminal innovation. We saw cryptojacking and botnets reach their most widespread, ransomware become more targeted, and phishing attacks transition their focus from financial to tech targets.
Webroot believes it's possible to effectively protect businesses and clients, but only by understanding the adversary and the techniques they use.
In this webinar, Webroot threat analyst Tyler Moffitt will offer insights into prevailing malware trends and tactics, and discuss how implementing a layered security strategy can help you protect your clients from multi-pronged attacks.
We hope you can join us for this live, educational session.
Robb DeFilippis, Managing Director, Life Sciences, Tag, Steve Pitts, Business Director, Tag, Dominic Tyer, pharmaphorumJul 9 20193:00 pmUTC75 mins
Customer journeys in pharma are changing, with important implications for the marketing supply chain. How can pharmaceutical marketers capitalise on this trend and free up budget to invest in additional marketing channels?
New developments in data and digital are changing traditional customer journeys and forcing pharmaceutical companies to evolve in order to keep up.
Companies like Apple and Amazon have elevated customer expectations for personalised content and interactions across multiple channels, in the process setting new standards for marketing. But, as they push the envelope, what are the implications for pharma’s work in customer engagement?
This pharmaphorum webinar, in association with Tag, will examine the challenges that pharma marketing faces to stay ahead of the evolving customer journey and offer expert insight from both the pharma and FMCG sectors on how to convert these challenges into opportunities .
The expert panel will consider exclusive research carried out by Tag and pharmaphorum across the US, Europe and Asia-Pacific among senior decision-makers in pharma and FMCG marketing.
The webinar, which takes place on Tuesday 9th July at 16:00 BST , will also look at:
•How pharma currently allocates its marketing budgets
•Where marketers would like to have more money to invest
•How much time is spent directing creative ideation and managing marketing production
Paul Down, Senior Director Proofpoint Security Awareness TrainingJul 10 20193:30 amUTC38 mins
As phishing attacks continue to make global headlines, become more sophisticated and bypass traditional email security gateways; we need to empower our workforce to be aware and ready to detect them alongside the technology.
Our fifth annual, 2019 State of the Phish Report explores this evolving threat landscape, offering insights drawn from tens of millions of simulated phishing attacks and our global survey of 15,000 infosec professionals over the last 12 months.
Join Paul Down, Senior Director, Proofpoint Security Awareness Training as he discusses the key findings from our latest 2019 State of the Phish report. You'll learn:
- How to build a people centric security strategy
- Steps organizations are taking to mitigate end-user risk from phishing
Cathy McNally joins us to discuss public speaking techniques and how to make your messages stand out to your audience!
Cathy McNally has been making people laugh and helping them learn (usually at the same time) for nearly 20 years. Cathy brings her background as a comic and her expertise in powerful communication to create fun, interactive, and highly effective workshops, coaching, and keynotes.
Ramesh Veerappan,Shawn Petway,Khuan Tan, Dharma KuthanurJul 10 20195:00 pmUTC58 mins
As Railinc modernizes its data infrastructure, critical data has become distributed across Oracle, data lake and tools like SAS, and business users have been challenged to find and understand the data they need. Railinc embarked on a major effort across business & IT to address this problem by cataloging all data assets and adding business context to the data to enable easy search and discovery. Confidence in the data was improved through visibility into how datasets were created and business descriptions and tags that added business context, along with a focused/phased approach to drive business user adoption. Railinc will share valuable lessons and best practices related to both: (1) deployment and scaling; (2) driving business user adoption.
Ryan Terry, Product Marketing, Proofpoint & Stephen Dougherty, Financial Investigator, US Secret ServiceJul 10 20195:00 pmUTC73 mins
Email fraud is one of today's most common – and most costly – cyber threats. It’s also the most effective means to infiltrate just about any company. There are many ways the bad guys go about compromising the network and getting what they want: spear phishing, BEC / CEO fraud attacks, W2 scam, ransomware… the list goes on and on.
What’s the best way to defend your organization from business email compromise (BEC) and other email spoofing attacks?
Join our experts, Ryan Terry, Manager, Product Marketing from Proofpoint and Stephen Dougherty, Contractor - Financial Investigator from the United States Secret Service - Global Investigative Operations Center (GIOC), for a deep dive into real world email fraud examples and a discussion of best practice defense strategies.
- Common identity deception tactics cyber criminals use to target your employees, business partners, and customers
- How fraudsters use social engineering to reach the right person at the right time
- How to identify and stop email fraud attacks before they reach the inbox
Ed Lee, Technical Director at icare and Dan Owen, Director, Customer Success Architecture at MuleSoftJul 11 20194:00 pmUTC59 mins
In this webinar, icare will share how they were able to create from scratch Australia's largest public sector self-insurer in just three years. Using an API-led approach to integration, they overcame the 'gravity' of legacy systems to move to the cloud and deliver patient-centric outcomes efficiently and fast.
Join this webinar to learn how to:
- De-risk legacy modernisation initiatives using APIs.
- Decouple systems and data to build a future-proof cloud architecture that supports ongoing change.
- Unlock data in machine-learning systems and support automated business process decisions.
Martin Tuip - Senior Information Archive StrategistJul 11 20195:00 pmUTC47 mins
The world is changing and so are the targets cyber criminals are going after. On-premises archiving solutions have been around for almost 2 decades but there also come these days with some inherit increasing risks. What do these risks look like and what can you do to defend against them?
Join this second of four webisodes to learn about:
- Why cyber criminals might be targeting your archive
- The top security risks of on-premises archives
- How to reduce your risk
George Anderson, Director of Product Marketing, WebrootJul 16 20193:00 pmUTC60 mins
Phishing is flying under most organisations radar. Yet more than nine of 10 successful security breaches start with a phish.
Phishing takes many forms and is constantly adapting and morphing to become harder to detect and therefore harder to stop. We used to talk about polymorphic malware, but we now live in the age of polymorphic phishing.
This webinar looks at the real threat that poses and defenses you can use to mitigate its effects on profitability.