Hi [[ session.user.profile.firstName ]]

Mergers and Acquisitions

  • On-line Privacy, Security, and Seamless Patient Experiences
    On-line Privacy, Security, and Seamless Patient Experiences
    Balraj Dhillon, Engagement Director - Key Accounts-Simeio & Baber Amin, West CTO-Ping Identity Recorded: Nov 17 2020 47 mins
    Your patients and members are today's consumers, and they expect seamless user experiences. But you can't meet their demands at the expense of security. You must remain a stalwart steward of protected health information (PHI) and personally identifiable information (PII). The distributed nature of healthcare delivery and R&D make this an especially difficult balancing act.

    View this webinar OnDemand to learn how Simeio Solutions, on the Ping Identity Platform, offered patients the privacy and security they needed in a real life healthcare portal.
  • Post-COVID-19 Food & Beverage Value Chain Shift in 2021 and Beyond
    Post-COVID-19 Food & Beverage Value Chain Shift in 2021 and Beyond
    Chris Shanahan, Consulting Director, Chemicals, Materials & Nutrition, Frost & Sullivan Recorded: Nov 17 2020 67 mins
    Attend the webinar to gain critical insights:

    1. Recommendations to help generate, evaluate, and implement effective strategies given the current challenging times.
    2. How to leverage technological advancements in various fields—from Information Technology to Chemicals and Biologicals, developers of agricultural equipment, consumables, and services—can provide solutions that benefit farmers, such as enhanced product quality, minimization of input use and waste, and overall profit optimization.
    3. Better understand growth in the market share of private store brands versus traditional national brands will accelerate, especially in the United States.
    4. Learn potential consequences on the structure of future food and beverage value chains and how we obtain, cook, and eat our food for at least the next decade.
  • Binary Scanning 101: Pulling back the covers on binaries
    Binary Scanning 101: Pulling back the covers on binaries
    Lisa Bryngelson, Senior Product Manager at Synopsys Recorded: Nov 17 2020 61 mins
    Organizations across every industry increasingly rely on open source software to form the foundation of the products and technologies they deliver to the market. So you can assume that the third-party commercial software you depend on from supply chain partners and outsourcers also uses open source as its backbone. The challenge is deciding whether to trust that your vendors are managing potential open source security vulnerabilities proactively or to verify for yourself that the open source embedded in the software you procure remains up to date and secure. The latter, what we refer to as “trust but verify,” requires tools that can look inside compiled binaries to ensure the whole of your application is secure.

    Join Lisa Bryngelson, senior product manager at Synopsys, as she pulls back the covers on how Black Duck tackles binary scanning. In this webinar, she’ll discuss:

    · Binary scanning basics and best practices

    · How binary scanning works

    · The different types of binary scanning and identification techniques

    · The challenges in detecting specific components or versions

    · How developers can make it easier for scanners to produce accurate and precise results
  • Ask Me Anything:  Avoiding Privilege-Related Blindspots
    Ask Me Anything: Avoiding Privilege-Related Blindspots
    James Quick,Director-Solutions & Advisory, Simeio and Brian Chappell, Director-Product Management, Beyond Trust Recorded: Nov 13 2020 30 mins
    Joins us for #SimeioCoffeeTalks

    Simeio Coffee Talks were created to give IAM and IT professionals space to soundboard and troubleshoot problems related to remote work.
  • Welcome To Nuix Discover
    Welcome To Nuix Discover
    Jennifer Luningham Recorded: Nov 5 2020 59 mins
    In this session you’ll learn the essentials of Nuix Discover, the all-in-one platform for the world’s best processing, essential analytics, and smart review. Special attention is focused on visual analytics that quickly reveal the critical details of every project, visual machine learning that leverages your team from 10 to 1000 with proven algorithms-based decision logic based on your subject matter experts’ decisions, and Nuix Discover’s effortless client management features via multi-tenancy, real-time reporting, and workspace flexibility for varied user perspectives.
  • Implementing SAST into your SDLC: What to look for & what to consider
    Implementing SAST into your SDLC: What to look for & what to consider
    Rob Haines, Senior Sales Engineer, Synopsys Recorded: Nov 5 2020 50 mins
    So you’ve decided (or been told) that you need to implement SAST in your software development process. But SAST is not a one-size-fits-all solution, and implementation often requires a compromise between technology, time, process, and people—especially people. In this webinar, we’ll look at common objections and pitfalls that you might encounter along the way.

    We'll cover:
    • What you should look for in a tool
    • Considerations for implementing SAST
    • Importance of the process (getting a good return on your investment)
    • High-quality and more secure software
  • Ask Me Anything:  Onboarding Workforce
    Ask Me Anything: Onboarding Workforce
    Michael Bickford, Director, Solutions & Advisory-Simeio Mark Whitesell, Senior Manager, Solutions Engineers -Okta Recorded: Oct 30 2020 19 mins
    Joins us for #SimeioCoffeeTalks

    Simeio Coffee Talks were created to give IAM and IT professionals space to soundboard and troubleshoot problems related to remote work.
  • What’s New and What’s Next in Nuix Investigate 8.8
    What’s New and What’s Next in Nuix Investigate 8.8
    Charles Kline and Kenji Ogama Recorded: Oct 28 2020 25 mins
    The release of Nuix Investigate version 8.8 continues to build a superior user experience for search, review, and analysis. Join Nuix Investigate Product Manager Charles Kline and Nuix Solutions Consultant Kenji Ogama for a look at how some of the features and enhancements available in Nuix Investigate 8.8 can be used to drive collaboration with easy to use access to any of your Nuix Cases.

    Examples will include support for Microsoft Teams chat data, connecting to your Nuix Investigate instance from an external source, such as a custom report. Also, get a sneak peek at enterprise-ready features coming up in Nuix Investigate 9.0 and beyond.
  • Exploring the growing applications of AI in the automotive sector
    Exploring the growing applications of AI in the automotive sector
    Martin Soukup, VP of R&D Connected Transport at Irdeto Recorded: Oct 26 2020 59 mins
    In this webinar we we look into the automotive sector and gain insight on how AI is impacting areas of this industry and what the key challenges are in adopting AI in the automotive industry.

    Our host will be discussing AI in the automotive industry and if it is the answer to the industry's troubles as well as looking into the risks associated with adopting the technology.
  • Adapting your innovation strategy around changes in international IP law
    Adapting your innovation strategy around changes in international IP law
    Marc Kaufman, Partner at Rimon Law Recorded: Oct 23 2020 60 mins
    In this webinar we look at current changes in international IP law and how to adjust your innovation strategy to improve the value of IP assets.

    Our host will be taking us through his journey of being a patent attorney and the importance of having a sound strategy in place. He will also touch on hot topics such as AI, big data and blockchain and the role they play in shaping the global IP landscape.
  • Ask Me Anything: Authentication to Privileged Accounts, Part III
    Ask Me Anything: Authentication to Privileged Accounts, Part III
    Vikram Subramanian, VP of Solutions and Chris Hills Deputy CTO-Beyond Trust Recorded: Oct 23 2020 30 mins
    Joins us for #SimeioCoffeeTalks

    Simeio Coffee Talks were created to give IAM and IT professionals space to soundboard and troubleshoot problems related to remote work.
  • Are You Acquiring the Next Big Breach? Security Vulnerabilities & M&A
    Are You Acquiring the Next Big Breach? Security Vulnerabilities & M&A
    Hal Hearst, Synopsys Recorded: Oct 22 2020 57 mins
    Software contains vulnerabilities and if you’re acquiring a company where software is a big part of the deal, you should understand if there is anything in that software that can be exploited.

    Join this live webinar to learn why security is a key piece of tech due diligence and the way your audit vendor manages their security data matters. We’ll cover:

    •Why due diligence has moved beyond license compliance
    •How you (and your vendor) can get a more in-depth view of your vulnerabilities
    •Strategies for understanding your security risks

    Don’t miss this informative webinar. Register today.
  • 5 innovation trends within the food industry
    5 innovation trends within the food industry
    Samuel Gibbon Recorded: Oct 16 2020 56 mins
    In this webinar we'll be taking a closer look at the emerging trends in the food industry, unlocking insights in the areas of VC investments, acquisitions and competitive developments.
  • AMA:  Unlocking the Opportunities of the Future with Digital Identity
    AMA: Unlocking the Opportunities of the Future with Digital Identity
    Balraj Dhillon, Engagement Director - Key Accounts-Simeio Danielle Kucera, PMM-Okta Recorded: Oct 16 2020 32 mins
    Joins us for #SimeioCoffeeTalks

    Simeio Coffee Talks were created to give IAM and IT professionals space to soundboard and troubleshoot problems related to remote work.

    AMA: Unlocking the Opportunities of the Future with Digital Identity
  • Technology transfer in 2020: Major changes and industry impacts
    Technology transfer in 2020: Major changes and industry impacts
    Rajiv Dhawan, Sharon Semones, Richard Chylla Recorded: Oct 16 2020 59 mins
    This webinar brings together industry experts from healthcare, technology and academia for lively discussions, debate and networking. During one hour we discussed about the key pivots the tech transfer industry has had to make this year, with a focus on the industries and partners that have been impacted the most.
  • Enriching Nuix Processing and Nuix Investigate for Information Governance
    Enriching Nuix Processing and Nuix Investigate for Information Governance
    Phil Glod and Arron Hepfer Recorded: Oct 14 2020 42 mins
    This webinar will walk you through a sample information governance workflow, using the following Nuix Workstation and Nuix Investigate components: custom named entities, worker side scripting (for custom auto classification), custom dashboards for information governance, link analysis, and creating reports.
  • Threat Modeling Program Maturity – Establish and Mature Threat Modeling Programs
    Threat Modeling Program Maturity – Establish and Mature Threat Modeling Programs
    Chandu Ketkar, Director Security Architecture Practice at Synopsys and Himanshu Tiwari, Managing Consultant at Synopsys Recorded: Oct 14 2020 59 mins
    What differentiates a highly mature threat modeling program from a less mature program? How do companies get started with threat modeling? What does the journey to higher levels of maturity look like? What are the key anchors of building the threat modeling capability?

    Join our talk as we share what we've learned through the years working with clients. Find out how companies evolve their threat modeling programs and maturity.
  • Ask Me Anything:  The Value of Rapid Application Onboarding
    Ask Me Anything: The Value of Rapid Application Onboarding
    Dave Culbertson-Saviynt, Director of Partner Solutions Engineering & Strategy and Vipin Jain-Simeio,Product Manager Recorded: Oct 13 2020 30 mins
    Joins us for #SimeioCoffeeTalks

    Simeio Coffee Talks were created to give IAM and IT professionals space to soundboard and troubleshoot problems related to remote work.
  • Ask Me Anything:   Securing the Remote Workforce
    Ask Me Anything: Securing the Remote Workforce
    Troy Keur-Simeio, Director of Solutions Advisory & Todd Moseley-CyberArk,Global Sales Director - Endpoint Privilege Manager Recorded: Oct 13 2020 30 mins
    Joins us for #SimeioCoffeeTalks

    Simeio Coffee Talks were created to give IAM and IT professionals space to soundboard and troubleshoot problems related to remote work.
  • Ask me Anything:  Promoting Diversity in the Workplace
    Ask me Anything: Promoting Diversity in the Workplace
    Christie Pugh, Analyst Relations-Simeio, Kay Chopard Cohen, US Ambassador-Women in Identity Recorded: Oct 13 2020 33 mins
    Joins us for #SimeioCoffeeTalks

    Simeio Coffee Talks were created to give IAM and IT professionals space to soundboard and troubleshoot problems related to remote work.

    Ask Me Anything: Promoting Diversity in the Workplace
  • Ask Me Anything:  The Value of Rapid Application Onboarding
    Ask Me Anything: The Value of Rapid Application Onboarding
    Dave Culbertson-Saviynt, Director of Partner Solutions Engineering & Strategy and Vipin Jain-Simeio,Product Manager Recorded: Oct 13 2020 31 mins
    Joins us for #SimeioCoffeeTalks

    Simeio Coffee Talks were created to give IAM and IT professionals space to soundboard and troubleshoot problems related to remote work.
  • Ask Me Anything:   Securing the Remote Workforce
    Ask Me Anything: Securing the Remote Workforce
    Troy Keur-Simeio, Director of Solutions Advisory & Todd Moseley-CyberArk,Global Sales Director - Endpoint Privilege Manager Recorded: Oct 13 2020 31 mins
    Joins us for #SimeioCoffeeTalks

    Simeio Coffee Talks were created to give IAM and IT professionals space to soundboard and troubleshoot problems related to remote work.
  • AMA:  Authentication to Privileged Accounts
    AMA: Authentication to Privileged Accounts
    Vikram Subramanian-Simeio,VP of Solutions & Christopher Hills-Beyond Trust,Deputy CTO Recorded: Oct 13 2020 30 mins
    Simeio Coffee Talks were created to give IAM and IT professionals space to soundboard and troubleshoot problems related to remote work. Join us for 30 minutes for a continuation on our topic, Authentication of Privileged Accounts with Vikram Subramanian, VP of Solutions at Simeio Solutions, and Christopher Hills, Deputy CTO at BeyondTrust.
  • Ask me Anything:  Promoting Diversity in the Workplace
    Ask me Anything: Promoting Diversity in the Workplace
    Christie Pugh, Analyst Relations-Simeio, Kay Chopard Cohen, US Ambassador-Women in Identity Recorded: Oct 13 2020 34 mins
    Joins us for #SimeioCoffeeTalks

    Simeio Coffee Talks were created to give IAM and IT professionals space to soundboard and troubleshoot problems related to remote work.

    Ask Me Anything: Promoting Diversity in the Workplace
  • Using Nuix Workstation for eDiscovery
    Using Nuix Workstation for eDiscovery
    Jessica Solano Recorded: Oct 1 2020 56 mins
    Using Nuix Workstation for eDiscovery

    In this short overview, we will take a quick look at a few of the concepts and analytics that will be discussed in Nuix Training to mimic a Nuix eDiscovery workflow from beginning to end. In training, we will explore what happens when you receive data, how to get it into Nuix, and how we can use techniques in Nuix to analyze, search, and cull data all the way to a production and legal export.
  • Guilt: How Do We Prove It?
    Guilt: How Do We Prove It?
    Malcolm Jeffries Dec 3 2020 4:00 pm UTC 60 mins
    During this short session, we will discuss some of the digital forensic artifacts that we can pull from our data sets using various techniques available to the Nuix Workstation end user. Within the Nuix training classes we cover various Windows subjects, such as identifying key artifacts that assist us in proving a suspect’s knowledge of the presence of incriminating data.
  • Why Open Source Compliance Matters for SaaS: Truths, Myths, and Considerations
    Why Open Source Compliance Matters for SaaS: Truths, Myths, and Considerations
    Anthony Decicco, Shareholder, GTC Law Group & Affiliates & Phil Odence, GM Black Duck Audits, Synopsys Dec 3 2020 5:00 pm UTC 60 mins
    If you offer a product via a software-as-a-service (SaaS) model, you may have heard that some of the most common open source licenses, while being potentially quite problematic for distributed software, may give a "free pass” to SaaS applications. Are you required to adhere to open source license obligations in a SaaS model? 


    Join us for this live Synopsys webinar to learn how to address open source software use in a SaaS model. We’ll cover:

    - The legal considerations around open source license compliance 
    - How security impacts open source software in a SaaS application
    - The operational and strategic pitfalls to avoid
    - The impact on financing, M&A and IPO due diligence

    Don’t miss the informative webinar. Register today.
  • See the Larger Security Picture - Enhancing the Tools You Already Have
    See the Larger Security Picture - Enhancing the Tools You Already Have
    Simon King, VP Solutions, Synopsys Software Integrity Group Dec 10 2020 6:00 pm UTC 43 mins
    DevOps and Agile development teams work iteratively to deliver customer value faster. They accelerate productivity with external software such as open-source, and external infrastructure such as cloud and containers. But this increases the threat surface and potential security risk. This leads to using more security tools, and complexity associated with managing test results and governance.

    Join Simon King from Synopsys on this journey enabling teams to see the larger security picture – transparently – enhancing the tools you already use.

    In this session you’ll learn about:
    - The challenges associated with managing test execution with multiple tools.
    - The opportunities to streamline communication between teams when coordinating triage and issue remediation.
    - How to make app sec “invisible” to the development team inside your existing CI/CD toolchain.
    - How to manage continuous improvement in risk posture
  • PAM – Best Practices for rapidly securing Business Critical Global Apps
    PAM – Best Practices for rapidly securing Business Critical Global Apps
    Rohit Nambiar-Equifax, Ron Spitz-CyberArk, Anurag Dewan-Simeio Dec 10 2020 7:30 pm UTC 60 mins
    10-Dec 2:30 EST Webinar Equifax/Simeio/CyberArk
    PAM – Best Practices for rapidly securing Business Critical Global Apps

    Rohit Nambiar Equifax Director of IAM
    Ron Spitz CyberArk SE Regional Manager, Customer Success
    Anurag Dewan Simeio Engagement Manager
  • Maximizing the Impact of Static Analysis
    Maximizing the Impact of Static Analysis
    Meera Rao, Senior Director – Product Management (DevOps Solutions) Dec 15 2020 5:00 pm UTC 60 mins
    Static analysis, also known as white box testing, static application security testing (SAST), or secure code review, finds bugs in application code, back doors, and other code-based vulnerabilities so you can mitigate those risks. But no static analysis tool can effectively address threats to a development environment out of the box. And many users have the misconception that the cost of tool adoption depends primarily on getting the tool working in a build environment.

    Static analysis is the only way to enable developers to automatically identify vulnerabilities as they write code in their integrated development environment (IDE). With SAST, developers can:
    •Run scans in their IDE by using plugins that provide just-in-time security guidance.
    •Review source code before checking it into a version control repository.
    •Remediate identified vulnerabilities.
    •Adopt a preventative mindset.

    Automation is an important part of adopting a SAST tool, as it drives efficiency, consistency, and early detection, enabling organizations to shift left. For a static analysis implementation to be effective, several distinct activities must come together to establish and maximize its impact. This webinar covers some challenges of SAST implementation and provides real solutions to get the most value out of SAST tools.
  • Open Source During an M&A Process: Buyer and Sellers Tips on How to Manage Risk
    Open Source During an M&A Process: Buyer and Sellers Tips on How to Manage Risk
    Ben Landry, Assistant General Counsel, Health Catalyst, Inc. Dec 16 2020 5:00 pm UTC 60 mins
    Whether you sit on the buy-side or sell-side of an M&A transaction, open source use in the software development process introduces legal and security risks into the deal. There are a number of key considerations to be aware of to minimize risk through the M&A due diligence process.

    Join this live Synopsys webinar to get a practical advice on preparing for tech due diligence from an in-house attorney with experience on both sides of the transaction. We’ll cover:

    •When and how to invest in open source diligence
    •How to manage open source and prepare for a sale
    •How Covid has impacted the due diligence process

    Don’t miss this informative webinar. Register today.
  • The 2020 Open Source Year in Review
    The 2020 Open Source Year in Review
    Mark Radcliffe, Partner at DLA Piper & Tony Decicco, Shareholder, GTC Law Group & Affiliates & Phil Odence, GM, Synopsys Jan 21 2021 5:00 pm UTC 75 mins
    Gain insights into important legal developments from two of the leading open source legal experts, Mark Radcliffe, partner at DLA Piper and general counsel for the Open Source Initiative, and Tony Decicco, shareholder at GTC Law Group & Affiliates.

    This annual review will highlight the most significant legal developments related to open source software in 2020.