Balraj Dhillon, Engagement Director - Key Accounts-Simeio & Baber Amin, West CTO-Ping IdentityRecorded: Nov 17 202047 mins
Your patients and members are today's consumers, and they expect seamless user experiences. But you can't meet their demands at the expense of security. You must remain a stalwart steward of protected health information (PHI) and personally identifiable information (PII). The distributed nature of healthcare delivery and R&D make this an especially difficult balancing act.
View this webinar OnDemand to learn how Simeio Solutions, on the Ping Identity Platform, offered patients the privacy and security they needed in a real life healthcare portal.
Chris Shanahan, Consulting Director, Chemicals, Materials & Nutrition, Frost & SullivanRecorded: Nov 17 202067 mins
Attend the webinar to gain critical insights:
1. Recommendations to help generate, evaluate, and implement effective strategies given the current challenging times.
2. How to leverage technological advancements in various fields—from Information Technology to Chemicals and Biologicals, developers of agricultural equipment, consumables, and services—can provide solutions that benefit farmers, such as enhanced product quality, minimization of input use and waste, and overall profit optimization.
3. Better understand growth in the market share of private store brands versus traditional national brands will accelerate, especially in the United States.
4. Learn potential consequences on the structure of future food and beverage value chains and how we obtain, cook, and eat our food for at least the next decade.
Lisa Bryngelson, Senior Product Manager at SynopsysRecorded: Nov 17 202061 mins
Organizations across every industry increasingly rely on open source software to form the foundation of the products and technologies they deliver to the market. So you can assume that the third-party commercial software you depend on from supply chain partners and outsourcers also uses open source as its backbone. The challenge is deciding whether to trust that your vendors are managing potential open source security vulnerabilities proactively or to verify for yourself that the open source embedded in the software you procure remains up to date and secure. The latter, what we refer to as “trust but verify,” requires tools that can look inside compiled binaries to ensure the whole of your application is secure.
Join Lisa Bryngelson, senior product manager at Synopsys, as she pulls back the covers on how Black Duck tackles binary scanning. In this webinar, she’ll discuss:
· Binary scanning basics and best practices
· How binary scanning works
· The different types of binary scanning and identification techniques
· The challenges in detecting specific components or versions
· How developers can make it easier for scanners to produce accurate and precise results
In this session you’ll learn the essentials of Nuix Discover, the all-in-one platform for the world’s best processing, essential analytics, and smart review. Special attention is focused on visual analytics that quickly reveal the critical details of every project, visual machine learning that leverages your team from 10 to 1000 with proven algorithms-based decision logic based on your subject matter experts’ decisions, and Nuix Discover’s effortless client management features via multi-tenancy, real-time reporting, and workspace flexibility for varied user perspectives.
Rob Haines, Senior Sales Engineer, SynopsysRecorded: Nov 5 202050 mins
So you’ve decided (or been told) that you need to implement SAST in your software development process. But SAST is not a one-size-fits-all solution, and implementation often requires a compromise between technology, time, process, and people—especially people. In this webinar, we’ll look at common objections and pitfalls that you might encounter along the way.
• What you should look for in a tool
• Considerations for implementing SAST
• Importance of the process (getting a good return on your investment)
• High-quality and more secure software
Charles Kline and Kenji OgamaRecorded: Oct 28 202025 mins
The release of Nuix Investigate version 8.8 continues to build a superior user experience for search, review, and analysis. Join Nuix Investigate Product Manager Charles Kline and Nuix Solutions Consultant Kenji Ogama for a look at how some of the features and enhancements available in Nuix Investigate 8.8 can be used to drive collaboration with easy to use access to any of your Nuix Cases.
Examples will include support for Microsoft Teams chat data, connecting to your Nuix Investigate instance from an external source, such as a custom report. Also, get a sneak peek at enterprise-ready features coming up in Nuix Investigate 9.0 and beyond.
Marc Kaufman, Partner at Rimon LawRecorded: Oct 23 202060 mins
In this webinar we look at current changes in international IP law and how to adjust your innovation strategy to improve the value of IP assets.
Our host will be taking us through his journey of being a patent attorney and the importance of having a sound strategy in place. He will also touch on hot topics such as AI, big data and blockchain and the role they play in shaping the global IP landscape.
Rajiv Dhawan, Sharon Semones, Richard ChyllaRecorded: Oct 16 202059 mins
This webinar brings together industry experts from healthcare, technology and academia for lively discussions, debate and networking. During one hour we discussed about the key pivots the tech transfer industry has had to make this year, with a focus on the industries and partners that have been impacted the most.
Phil Glod and Arron HepferRecorded: Oct 14 202042 mins
This webinar will walk you through a sample information governance workflow, using the following Nuix Workstation and Nuix Investigate components: custom named entities, worker side scripting (for custom auto classification), custom dashboards for information governance, link analysis, and creating reports.
Chandu Ketkar, Director Security Architecture Practice at Synopsys and Himanshu Tiwari, Managing Consultant at SynopsysRecorded: Oct 14 202059 mins
What differentiates a highly mature threat modeling program from a less mature program? How do companies get started with threat modeling? What does the journey to higher levels of maturity look like? What are the key anchors of building the threat modeling capability?
Join our talk as we share what we've learned through the years working with clients. Find out how companies evolve their threat modeling programs and maturity.
Vikram Subramanian-Simeio,VP of Solutions & Christopher Hills-Beyond Trust,Deputy CTORecorded: Oct 13 202030 mins
Simeio Coffee Talks were created to give IAM and IT professionals space to soundboard and troubleshoot problems related to remote work. Join us for 30 minutes for a continuation on our topic, Authentication of Privileged Accounts with Vikram Subramanian, VP of Solutions at Simeio Solutions, and Christopher Hills, Deputy CTO at BeyondTrust.
In this short overview, we will take a quick look at a few of the concepts and analytics that will be discussed in Nuix Training to mimic a Nuix eDiscovery workflow from beginning to end. In training, we will explore what happens when you receive data, how to get it into Nuix, and how we can use techniques in Nuix to analyze, search, and cull data all the way to a production and legal export.
During this short session, we will discuss some of the digital forensic artifacts that we can pull from our data sets using various techniques available to the Nuix Workstation end user. Within the Nuix training classes we cover various Windows subjects, such as identifying key artifacts that assist us in proving a suspect’s knowledge of the presence of incriminating data.
Anthony Decicco, Shareholder, GTC Law Group & Affiliates & Phil Odence, GM Black Duck Audits, SynopsysDec 3 20205:00 pmUTC60 mins
If you offer a product via a software-as-a-service (SaaS) model, you may have heard that some of the most common open source licenses, while being potentially quite problematic for distributed software, may give a "free pass” to SaaS applications. Are you required to adhere to open source license obligations in a SaaS model?
Join us for this live Synopsys webinar to learn how to address open source software use in a SaaS model. We’ll cover:
- The legal considerations around open source license compliance
- How security impacts open source software in a SaaS application
- The operational and strategic pitfalls to avoid
- The impact on financing, M&A and IPO due diligence
Don’t miss the informative webinar. Register today.
Simon King, VP Solutions, Synopsys Software Integrity GroupDec 10 20206:00 pmUTC43 mins
DevOps and Agile development teams work iteratively to deliver customer value faster. They accelerate productivity with external software such as open-source, and external infrastructure such as cloud and containers. But this increases the threat surface and potential security risk. This leads to using more security tools, and complexity associated with managing test results and governance.
Join Simon King from Synopsys on this journey enabling teams to see the larger security picture – transparently – enhancing the tools you already use.
In this session you’ll learn about:
- The challenges associated with managing test execution with multiple tools.
- The opportunities to streamline communication between teams when coordinating triage and issue remediation.
- How to make app sec “invisible” to the development team inside your existing CI/CD toolchain.
- How to manage continuous improvement in risk posture
Meera Rao, Senior Director – Product Management (DevOps Solutions)Dec 15 20205:00 pmUTC60 mins
Static analysis, also known as white box testing, static application security testing (SAST), or secure code review, finds bugs in application code, back doors, and other code-based vulnerabilities so you can mitigate those risks. But no static analysis tool can effectively address threats to a development environment out of the box. And many users have the misconception that the cost of tool adoption depends primarily on getting the tool working in a build environment.
Static analysis is the only way to enable developers to automatically identify vulnerabilities as they write code in their integrated development environment (IDE). With SAST, developers can:
•Run scans in their IDE by using plugins that provide just-in-time security guidance.
•Review source code before checking it into a version control repository.
•Remediate identified vulnerabilities.
•Adopt a preventative mindset.
Automation is an important part of adopting a SAST tool, as it drives efficiency, consistency, and early detection, enabling organizations to shift left. For a static analysis implementation to be effective, several distinct activities must come together to establish and maximize its impact. This webinar covers some challenges of SAST implementation and provides real solutions to get the most value out of SAST tools.
Ben Landry, Assistant General Counsel, Health Catalyst, Inc.Dec 16 20205:00 pmUTC60 mins
Whether you sit on the buy-side or sell-side of an M&A transaction, open source use in the software development process introduces legal and security risks into the deal. There are a number of key considerations to be aware of to minimize risk through the M&A due diligence process.
Join this live Synopsys webinar to get a practical advice on preparing for tech due diligence from an in-house attorney with experience on both sides of the transaction. We’ll cover:
•When and how to invest in open source diligence
•How to manage open source and prepare for a sale
•How Covid has impacted the due diligence process
Don’t miss this informative webinar. Register today.
Mark Radcliffe, Partner at DLA Piper & Tony Decicco, Shareholder, GTC Law Group & Affiliates & Phil Odence, GM, SynopsysJan 21 20215:00 pmUTC75 mins
Gain insights into important legal developments from two of the leading open source legal experts, Mark Radcliffe, partner at DLA Piper and general counsel for the Open Source Initiative, and Tony Decicco, shareholder at GTC Law Group & Affiliates.
This annual review will highlight the most significant legal developments related to open source software in 2020.