Hi [[ session.user.profile.firstName ]]

Procurement and Sourcing

  • Technology Asset Discovery tools aren’t working. Find out why & fix it.
    Technology Asset Discovery tools aren’t working. Find out why & fix it.
    Mark Gaydos, CMO, at Nlyte Recorded: Feb 27 2020 21 mins
    - More than 10% of assets on network go undetected
    - Only 10% of data center managers believe that all assets are detectable and monitored
    - 87% of organizations believe 10% of assets or more are not in their CMDB

    Learn about the agentless technology software that scans your network to inventory your hardware, software and networking assets from desktop to data center to cloud. It supports all major protocols, integrates with your CMDB and creates a single source of knowledge of 100’s of data points.
  • How to Perform a Security Investigation in AWS
    How to Perform a Security Investigation in AWS
    Kyle Dickinson, SANS Institue | David Aiken, AWS Marketplace Solutions Architect Recorded: Feb 27 2020 53 mins
    Do you have a plan in place describing how to conduct an effective investigation in AWS? What security controls, techniques, and data sources can you leverage when investigating and containing an incident in the cloud? Learn how to leverage different technologies to determine the source and timeline of the event, and the systems targeted to define a reliable starting point from which to begin your investigations.

    In this recorded webcast, SANS instructor and cloud security expert Kyle Dickinson explains how to conduct an investigation in AWS from preparation through completion.

    Attendees at this webcast will learn about:
    - Prerequisites for performing an effective investigation
    - Services that enable an investigation
    - How to plan an investigation
    - Steps to completing an investigation in AWS

    Register for this webcast to be among the first to receive the associated whitepaper written by incident response and forensics expert Kyle Dickinson.

    Speaker Bios

    Kyle Dickinson teaches SANS SEC545: Cloud Security Architecture and Operations and has contributed to the creation of other SANS courses. He is a cloud security architect for one of the largest privately held companies in the United States. As a strategic consultant in his organization, Kyle partners with businesses in various industries to better understand security and risks associated with cloud services. He has held many roles in IT, ranging from systems administration to network engineering and from endpoint architecture to incident response and forensic analysis.

    David Aiken is a Solutions Architect Manager at AWS Marketplace and is an AWS Certified Solutions Architect. He leads a team of specialist SA’s that help customers implement security and governance best practices. His skills include cloud computing, enterprise architecture, agile methodologies, web services, and software design and development.
  • Technology Asset Discovery tools aren't working. Find out why & fix it
    Technology Asset Discovery tools aren't working. Find out why & fix it
    Mark Gaydos, CMO, at Nlyte Recorded: Feb 27 2020 21 mins
    - More than 10% of assets on network go undetected
    - Only 10% of data center managers believe that all assets are detectable and monitored
    - 87% of organizations believe 10% of assets or more are not in their CMDB

    Learn about the agentless technology software that scans your network to inventory your hardware, software and networking assets from desktop to data center to cloud. It supports all major protocols, integrates with your CMDB and creates a single source of knowledge of 100’s of data points.
  • Using Big Data to Improve Retail Margins
    Using Big Data to Improve Retail Margins
    Willl Auchincloss, VP Advisory & Analytics, PRGX | Jennifer Cyra, Former SVP Merchandising & Private Brands Office Depot Recorded: Feb 25 2020 31 mins
    Continuous channel shifts create competitive pressure for retailers to invest more in pricing and customer strategy, but greater complexity of data in today’s changing world and a lack of tools to tackle these new issues means that both managing margins and buying better are becoming more challenging than ever.

    In the next installment of PRGX’s Retail Webinar Series, learn how PRGX’s Merchandise Margin Improvement (MMI) solution attacks this margin leakage problem by using modern technologies and a big-data approach.

    Listeners will come away with information on how their companies could reduce COGS, increase working capital, and gain insights into the following value-enriching opportunities:

    - Item-Level Quick Wins
    - Compliance Programs
    - Data-led Negotiations
    - Margin Management Enhancements
    - Mergers & Acquisitions
  • Open Source vs Custom: Choosing the Best AppDev Approach
    Open Source vs Custom: Choosing the Best AppDev Approach
    Wesley Todd, CEO and co-founder, Caseglide and Ashok Yarlagadda, CIO, System Soft Technologies Recorded: Feb 25 2020 52 mins
    With the growing popularity of Open Source, many app developers face the question of whether to go that route or build with custom code. There are pros and cons to each. So how do you decide? And how does the fluid nature of digital transformation impact the decision?

    In this webinar, the co-founder and CEO of Caseglide, an insurance case management software company, describes his company’s journey in making this choice, the challenges faced, the approach employed for evaluating each, and the basis for the decision. He’ll also describe how things turned out from a technical and business perspective.

    Attend this webinar and learn:
    - Key factors that go into making this choice
    - How to decide which is best for you
    - How to evaluate alternative approaches
    - Important considerations in implementation and maintenance
    - Potential pitfalls to consider

    Presenters:

    Wesley Todd, CEO and co-founder, Caseglide
    Ashok Yarlagadda, CIO, System Soft Technologies
  • How to improve security visibility and detection-response operations in AWS
    How to improve security visibility and detection-response operations in AWS
    Dave Shackleford, SANS Analyst | Vinay Sukumar, Principal Category Leader (Security Intelligence) at AWS Recorded: Feb 20 2020 54 mins
    Security teams often handle a large stream of alerts, creating noise and impairing their ability to determine which incidents to prioritize. By aggregating security information from various sources and automating incident response, organizations can increase visibility into their environment and focus on the most important potential threats. In this webinar, SANS and AWS Marketplace explore how organizations can leverage solutions to create more signal and less noise for actionable responses, enhancing and accelerating security operations.

    Attendees will learn to:

    - Use continuous monitoring to gain insight into events and behaviors that move into and through your cloud environment
    - Integrate security incident and event management (SIEM) solutions to enhance detection and investigation of potential threats
    - Leverage security orchestration automation and response (SOAR) technologies to auto-remediate events and reduce noise in your environment

    Who should attend:
    Security practitioners (Security Analysts, Security Architects, Senior Security Engineers, etc.), Cloud Security Architects, and the office of the CISO.
  • How to prepare your data pipeline for machine learning and AI
    How to prepare your data pipeline for machine learning and AI
    Stewart Bond, Research Director, Data Integration and Integrity Software at IDC | Chris Chapman, Partner Solutions Architect Recorded: Feb 18 2020 50 mins
    Frequently, the hardest part of any machine learning (ML)/AI project is getting your data into the right format and the right place because your processes were designed around traditional application development. In this training-based webinar, Amazon Web Services (AWS) and global market intelligence provider, IDC, will deliver practical guidance to help you prepare a data pipeline that can automate machine learning workflows.

    Attendees will learn how to:

    - Manage your data pipeline, providing your organization access to reliable and well-structured datasets for analytics
    - Make meaningful decisions, faster, with improved data flows
    - Incorporate best practices for building dashboards to query specific data and identify trends when using connected AWS services
    - Leverage partner solutions such as Matillion ETL for Amazon Redshift for loading and transforming your data

    Who should attend?
    IT Operations Professionals in roles overseeing data science and architecture, BI and analytics and data preparation for machine learning
  • How Can Technology Help to Maximize Data?
    How Can Technology Help to Maximize Data?
    Payal Jain, MD & Chair of Women in Data UK and Anthony Scriffignano, SVP & Chief Data Scientist, Dun & Bradstreet Recorded: Feb 18 2020 2 mins
    Technology is a huge opportunity for the data industry but how do we keep human input? Payal Jain, MD & Chair of Women in Data UK and Anthony Scriffignano, SVP & Chief Data Scientist, Dun & Bradstreet, answer this question.
  • Optimize your working capital and supplier relationships at the same time
    Optimize your working capital and supplier relationships at the same time
    Marcus Fromm, Accenture and Mads Stolberg-Larsen, Tradeshift Recorded: Feb 6 2020 57 mins
    Transport and Logistics industry financial transformation

    Webinar hosted by Marcus Fromm, Managing Director/ Partner, Travel and Transportation Industry Lead, Accenture and Mads Solberg-Larsen, Head of Fintech and Blockchain, Tradeshift.

    In the Transport and logistics industry, your supply chain is the lifeblood of your organization. And while longer payment terms may improve your working capital they can also fray relations with your suppliers. In this webinar we take you through successful options for getting the most out of your working capital while still maintaining good relationships with your suppliers.

    • How major changes/trends and financial digitalisation is shaping the Transport and Logistics industry
    • Explore the benefits of true digital transformation—not just automation of age-old processes.
    • Discover how taking a closer look at back-office operations such as AP can unlock big savings.
    • Learn the critical role supply chain finance plays and how to make it work for you
    • Learn how the big players in the industry are digitizing to transform
  • The Proactive Grocer: Keys to Preventing Losses
    The Proactive Grocer: Keys to Preventing Losses
    Mark Kilgore, Global Client Development, PRGX Recorded: Feb 6 2020 29 mins
    The grocery industry is by far one of the most demanding – constant change, new technologies to learn and complex promotions lead to inevitable mistakes and things slipping through the cracks.

    In this webinar, you’ll discover how to identify common points of leakage before they occur, the top trends in the industry and how you can use them to set your business ahead of the curve, and how to move from a reactive approach to a preventative approach as a proactive grocer.
  • A Modern Approach to Application Development Driven by Digital Transformation
    A Modern Approach to Application Development Driven by Digital Transformation
    Steve Moritz, Chief Digital Officer; Ashok Yarlagadda, Chief Information Officer Recorded: Jan 28 2020 58 mins
    Application development used to be relatively simple. You built one application to solve one problem that users accessed through one type of interface on one type of device. Requirements, data types, and formats were all pretty static. Development was linear and predictable. Skill sets/expertise of developers and user expectations were well-defined, not too diverse, and stable.

    Today, organizational innovation as fueled by digital transformation has completely changed this model. A tremendous variety of users (internal and external) demand an experience that delivers flexible functionality accessible across a number of interfaces, using a plethora of access pathways (cloud, mobile devices and apps, wearables, digital assistants, browsers). Their needs/expectations are fluid and the applications built must accommodate a much wider spectrum of requirements.

    For organizations to service their customers effectively in this new environment, many are turning outside app dev services to augment their in-house capabilities. These services are turning the traditional model on its head and providing valuable capabilities and capacity to deliver business agility.

    Attend this webinar and learn how to use this innovative model to deliver transformative technology and accelerate innovation.

    - What is appdev outsourcing and what are the characteristics of organizations that should leverage it?
    - What are the typical business benefits of these services?
    - How should an organization get started and determine the optimum service solution and provider?
    - What’s the future for appdev services?

    When: January 28, 2020, 11 am PST
    Presenters:
    - Steven Moritz, Chief Digital Officer, System Soft Technologies
    - Ashok Yarlagadda, CIO, System Soft Technologies
  • Why Your Source-to-Pay-Process Loses Money
    Why Your Source-to-Pay-Process Loses Money
    Josh Morrison, Solutions Specialist, Business Development, PRGX Recorded: Jan 28 2020 56 mins
    Many challenges exist throughout the Source-to-Pay (S2P) cycle. Companies are constantly challenged to find new efficiencies, identify leakage points to capture savings, and strategize around new profit-driving and growth opportunities.

    In this webinar, you will hear about the real keys to successfully managing your S2P processes, and the strategies and techniques that can be used by any organization to increase efficiency and effectiveness.

    In this webinar, our Global Director of Solution Consulting, Josh Morrison and Former CPO of UPS, Gary Kallenbach speak on how the best companies in the world optimize their S2P process.
  • 2020 H1 Global Food Commodity Review
    2020 H1 Global Food Commodity Review
    The Mintec Intelligence team Recorded: Jan 28 2020 19 mins
    Our analysts provide an exclusive market update and price outlook for the first half of the year on chosen key commodities.
  • Best practices when selecting a Colocation Provider
    Best practices when selecting a Colocation Provider
    Nlyte Recorded: Jan 15 2020 58 mins
    In this fast-moving market, what should businesses think about when selecting a provider? The shift to hybrid models of operation is here to stay.

    Enzo Greco, Chief Strategy Officer at Nlyte Software, Adam Levine Chief Commercial Officer at Data4 and George Rockett, CEO at DCD uncover key considerations for successful Colocation Provider and Tenant relationships:

    - Driving real-time visibility on resource-usage and performance to make data-based decisions
    - Reduce risk of downtime
    - Optimize consumption and reduce operational costs
    - Automating tasks and understanding facility performance
    - Great content for colocation providers and data center managers that use colocations
  • Best practices when selecting a Colocation Provider
    Best practices when selecting a Colocation Provider
    Nlyte Recorded: Jan 15 2020 58 mins
    In this fast-moving market, what should businesses think about when selecting a provider? The shift to hybrid models of operation is here to stay.

    Enzo Greco, Chief Strategy Officer at Nlyte Software, Adam Levine Chief Commercial Officer at Data4 and George Rockett, CEO at DCD uncover key considerations for successful Colocation Provider and Tenant relationships:

    - Driving real-time visibility on resource-usage and performance to make data-based decisions
    - Reduce risk of downtime
    - Optimize consumption and reduce operational costs
    - Automating tasks and understanding facility performance
    - Great content for colocation providers and data center managers that use colocations
  • How to Build a Threat Hunting Capability in AWS
    How to Build a Threat Hunting Capability in AWS
    Shaun McCullough, SEC545 Cloud Security Architecture | David Aiken, Solutions Architect Manager, AWS Marketplace Recorded: Jan 3 2020 53 mins
    Do you know how to build an effective threat hunting program in your AWS environment? In this webinar, you will learn how threat hunting differs from alerts and SOC monitoring, and what threats to look for. You will also discover real-life examples that demonstrate how threat hunters can apply cloud infrastructure best practices to reduce the noise in often chaotic environments, making it easier to detect potential events. Leveraging detailed use cases, this webinar can help you develop an effective threat hunting program.

    Attendees will learn to:

    - Use the threat hunting loop to identify what to look for, which tools you need to analyze available data, and ways to tease out patterns that indicate potential events
    - Strike the right balance of how much data to capture, identify gaps in information, and determine how best to collect that information
    - Analyze logs efficiently and effectively using Amazon CloudWatch, AWS CloudTrail, and Amazon GuardDuty
    - Automate the process of evaluating and enriching complex data sets by utilizing SIEM and SOAR solutions to detect possible threats

    Speaker Bios

    Shaun McCullough is a community instructor for the SEC545 Cloud Security Architecture and Operations class and gives back to his profession by mentoring and supporting the next generation of cyber professionals. With 25 years of experience as a software engineer, he has been focusing on information security for the past 15 years. Shaun is a consultant with H&A Security Solutions, focusing on secure cloud operations, building DevSecOps pipelines and automating security controls in the cloud.

    David Aiken is a Solutions Architect Manager at AWS Marketplace and is an AWS Certified Solutions Architect. He leads a team of specialist SA’s that help customers implement security and governance best practices. His skills include cloud computing, enterprise architecture, agile methodologies, web services, and software design and development.
  • How to Perform a Security Investigation in AWS
    How to Perform a Security Investigation in AWS
    Kyle Dickinson, SANS Institue | David Aiken, AWS Marketplace Solutions Architect Recorded: Dec 30 2019 53 mins
    Do you have a plan in place describing how to conduct an effective investigation in AWS? What security controls, techniques, and data sources can you leverage when investigating and containing an incident in the cloud? Learn how to leverage different technologies to determine the source and timeline of the event, and the systems targeted to define a reliable starting point from which to begin your investigations.

    In this recorded webcast, SANS instructor and cloud security expert Kyle Dickinson explains how to conduct an investigation in AWS from preparation through completion.

    Attendees at this webcast will learn about:
    - Prerequisites for performing an effective investigation
    - Services that enable an investigation
    - How to plan an investigation
    - Steps to completing an investigation in AWS

    Register for this webcast to be among the first to receive the associated whitepaper written by incident response and forensics expert Kyle Dickinson.

    Speaker Bios

    Kyle Dickinson teaches SANS SEC545: Cloud Security Architecture and Operations and has contributed to the creation of other SANS courses. He is a cloud security architect for one of the largest privately held companies in the United States. As a strategic consultant in his organization, Kyle partners with businesses in various industries to better understand security and risks associated with cloud services. He has held many roles in IT, ranging from systems administration to network engineering and from endpoint architecture to incident response and forensic analysis.

    David Aiken is a Solutions Architect Manager at AWS Marketplace and is an AWS Certified Solutions Architect. He leads a team of specialist SA’s that help customers implement security and governance best practices. His skills include cloud computing, enterprise architecture, agile methodologies, web services, and software design and development.
  • Five Simple Ways to Bolster Critical Infrastructure Efficiency
    Five Simple Ways to Bolster Critical Infrastructure Efficiency
    Enzo Greco, Chief Strategy Officer, Nlyte, Kollengode Anand, Segment Leader - DC Solutions, United Technologies Recorded: Dec 19 2019 43 mins
    In this webinar, Infrastructure experts at UTC and Nlyte Software discuss how you can:

    - Leverage sophisticated data center ecosystems, such as precision cooling
    - Provide insight into your ITSM solution
    - Improve resilience and reduce risk to your critical infrastructure
    - Create tighter integration between facilities and IT
  • How to Secure App Pipelines in AWS
    How to Secure App Pipelines in AWS
    Dave Shackleford | SANS analyst, SANS institute; David Aiken | Solutions Architect, AWS Marketplace Recorded: Dec 18 2019 56 mins
    Applications have evolved into containers and microservices deployed in fully automated and distributed environments across data centers and in AWS. This webinar focuses on the security of the continuous integration and continuous deployment (CI/CD) pipeline and security automation. In this prerecorded webcast, SANS senior instructor Dave Shackleford and AWS Solutions Architect David Aiken discuss how to improve and automate security across the entire CI/CD pipeline and runtime environment.

    Specifically, attendees will learn:
    - App security concepts specific to cloud environments, including management of secrets, security of APIs, serverless applications and security, and privilege management
    - The stages of a cloud-oriented development pipeline and how security can tie into the CI/CD pipeline
    - How to mitigate disruptions caused by perimeter-based and legacy security tools that don't fit into CI/CD practices
    - Solutions for securing your app pipeline in your AWS environment

    *********************

    Speaker Bios
    Dave Shackleford, a SANS analyst, instructor, course author, GIAC technical director and member of the board of directors for the SANS Technology Institute, is the founder and principal consultant with Voodoo Security. He has consulted with hundreds of organizations in the areas of security, regulatory compliance, and network architecture and engineering. A VMware vExpert, Dave has extensive experience designing and configuring secure virtualized infrastructures. He previously worked as chief security officer for Configuresoft and CTO for the Center for Internet Security.

    David Aiken is a Solutions Architect Manager at AWS Marketplace and is an AWS Certified Solutions Architect. He leads a team of specialist SA’s that help customers implement security and governance best practices. His skills include cloud computing, enterprise architecture, agile methodologies, web services, and software design and development.
  • Contract Audit: The Power of Prevention
    Contract Audit: The Power of Prevention
    Jon Daniells, CCa Audit Director Cc, US | Sara Clark, Director of Product Management, US Recorded: Dec 11 2019 60 mins
    Boosting the value delivered from your Contract Audit Program

    Traditionally, supplier contract audits have principally focused on finding past billings errors and working to recover those overbillings. However, as organizations gain a more sophisticated appreciation for the deep intelligence gained through contract audits, they are now demanding new strategies that are designed to locate errors sooner and prevent the same mistakes from being repeated. Historical recoveries, while still a desired outcome where they exist, are seen as a byproduct of the central objective, fixing problems that return even more significant value through recurring future cost savings.

    In this webinar, PRGX contract audit experts Jon Daniells and Sara Clark will recommend strategies for enhancing the value of your organization’s supplier audit program, while outlining the steps to help you recover lost profits sooner. Key takeaways from this webinar include:

    - Pathway to prevention: Learn the broad spectrum of where overpayment problems originate and how best to identify and fix the root causes

    - Supercharging your results: How evolving the maturity of your contract audit program will exponentially expand value to your company

    - From reactive to proactive: Key steps to building a program which identifies issues quicker, leading to immediate and sustained cost savings
  • Simplify Contract Discovery with DocuSign + Seal
    Simplify Contract Discovery with DocuSign + Seal
    Rebecca Yoder, Global Partner Solutions Director, DocuSign Recorded: Dec 11 2019 57 mins
    Join our on-demand webinar, where experts from DocuSign and Seal will discuss the value of our integration for managing completed contracts. They will be joined by customer speaker, Jeff Lokey, Vice President of Legal Affairs at Infloblox who recently began leveraging the combined power of DocuSign and Seal to streamline their contract management.

    Seal Software is the leading provider of contract discovery, analytics, and enables companies around the world to manage their contract portfolio by understanding exactly where their contracts are and what is buried in them, maximizing revenue opportunities, mitigating risk, and reducing extensions.

    In this webinar you will learn:

    • How to identify a need for Seal within your own business
    • The best way to build a business case and gain executive level buy in through real life examples
    • See a live demonstration
  • Financial, Physical Supply Chains and Blockchains:  Are We There Yet?
    Financial, Physical Supply Chains and Blockchains: Are We There Yet?
    Martha Bennett, VP, Principal Analyst at Forrester & Gert Sylvest, Co-Founder, GM of Tradeshift Frontiers Recorded: Dec 10 2019 61 mins
    Distributed ledger technology (DLT, AKA blockchain) and the internet of things (IoT) should be ideal companions. Distributed, peer-to-peer, blockchain-based networks enable the sharing of trusted data to support IoT scenarios that are difficult or impossible to implement with more traditional approaches. While these benefits will not emerge overnight, CIOs and CTOs need to understand the realities of blockchain technology in the IoT context. This webinar helps participants assess where blockchain should fit in their IoT plans . . . and vice versa.

    Join Tradeshift for an informative session!
  • Optimize Salesforce by Removing Data Barriers Between IT and Campus
    Optimize Salesforce by Removing Data Barriers Between IT and Campus
    Jeff Jones, Director of Information Systems, Fresno Pacific University, Douglas Louie, Director of Product Marketing, Informa Recorded: Dec 5 2019 30 mins
    As the Director of Information Systems at Fresno Pacific University, Jeff Jones was charged with optimizing the student information system. Moving from the legacy student information system to Salesforce necessitated the integration of many different databases. Come and learn how Fresno Pacific University increased visibility into student data, reduced integration time from weeks to a matter of days, and no longer needed to search for niche software when future integration needs arose.
  • AI-Powered Streaming Analytics for Real-Time Customer Experience
    AI-Powered Streaming Analytics for Real-Time Customer Experience
    Vishwa Belur, Director Product Management, Preetam Kumar, Product Marketing Manager Recorded: Dec 4 2019 50 mins
    What’s the best way for businesses to differentiate themselves today? By delivering a unique, real-time customer experience across all touch points—one that is based on a solid, connected business strategy driven by data and analytics insights.
    But interacting with customers in real time and in a relevant, meaningful way can be challenging for organizations with disparate sources of data, including at the edge, on-premises, and multi-cloud.
    To get maximum value and insight from customer data, you need a data management framework that can do three things:
    1) Sense - Capture event data and streaming data from sources such as social media, web logs, machine logs, and IoT sensors.
    2) Reason - Automatically process, correlate, and analyze this data to add context and meaningful insights.
    3) Act – Respond and take automated action in a reliable, timely, and consistent way.

    Join this webinar to learn how to:
    - Manage the entire end-to-end sense-reason-act process at any latency with an AI-powered streaming solution
    - Automate data management processes and guide user behavior for real-time streaming analytics with AI
    - Gain a clear understanding of how to use Spark Structured Streaming for data engineering using an intelligent data streaming solution that unifies streaming and batch data to deliver next best actions that improve customer experience
  • The Critical Update - 4Q 2019: Ten Data Center Industry Trends for 2020
    The Critical Update - 4Q 2019: Ten Data Center Industry Trends for 2020
    Andy Lawrence - Exec. Director of Research, Rhonda Ascierto - VP of Research, Dr. Rabih Bashroush - Research Director Recorded: Dec 4 2019 60 mins
    Join us for a discussion of some of the top trends in data centers for 2020. We will examine an industry that is expanding confidently, especially at the edge, attracting new investors and increasingly embracing new technologies. But there are some challenges to be faced in the new year, especially in the areas of resiliency, staffing, environmental impact and energy use.

    What should stakeholders expect in 2020? And which innovations will make a difference? Which have been overstated? Is the challenge of distributed resiliency being solved, or is it getting worse?
  • An Essential Guide to Using Credit Reference Agencies
    An Essential Guide to Using Credit Reference Agencies
    Ben Houlihan, Senior Risk Product Manager, Dun & Bradstreet Feb 28 2020 9:00 am UTC 6 mins
    This short video covers:

    - An introduction to using credit reference agencies in your credit management practices
    - The top three things to consider when assessing the risk profile of a new customer
    - Best practice in ongoing portfolio management to identify risk exposure
  • JumpStart Guide for Endpoint Security in AWS
    JumpStart Guide for Endpoint Security in AWS
    David Hazar SANS analyst, SANS Institute | David Aiken, Solutions Architect Manager AWS Marketplace Mar 3 2020 2:00 pm UTC 56 mins
    When migrating endpoint security controls to protect their cloud workloads, organizations must first consider their own security, operational and business needs. Next, they should assess their requirements against the solutions already in use in-house against the in-cloud security solutions they’re considering. Ultimately, these requirements should help organizations come to a decision on whether to migrate their existing security to the cloud, or use cloud-provided tools to protect their cloud endpoints.

    SANS instructor David Hazar, AWS Solutions Architect Manager David Aiken, and Optiv Cloud Security Practice Leader Joe Vadakkan will release guidelines for determining your cloud endpoint security controls and selecting solutions through the AWS Marketplace.

    Attendees will learn:

    - How cloud design affects endpoint security
    - Needs and capabilities associated with endpoint security platforms in the cloud (such as automation, behavioral detection and blocking, and threat hunting capabilities)
    - Specific focus on cloud-based endpoint detection and response (EDR)
    - Solution guidance and evaluation considerations for endpoint security platforms, including real-world success observations
    - Key questions for potential vendors to determine which endpoint security platform(s) are best-suited for integration and implementation in your AWS environment

    Join this webinar and gain practical knowledge on how to evaluate and select an effective endpoint security platform for the cloud. Don’t miss this opportunity to improve your endpoint security strategy with industry-leading guidance from SANS, Optiv and AWS Marketplace.
  • How to leverage endpoint detection and response (EDR) in AWS investigations
    How to leverage endpoint detection and response (EDR) in AWS investigations
    Justin Henderson, SANS Analyst | Saager Khasnis, Partner Solutions Architect at AWS Mar 10 2020 2:00 pm UTC 61 mins
    Adding EDR capabilities into your AWS (Amazon Web Services) environment can inform investigations and provide actionable details for remediation. Attend this webinar to discover how to unpack and leverage the telemetry provided by endpoint security solutions using MITRE Cloud examples, such as Exploit Public-Facing Application (T1190) and Data Transfer to Cloud Account (T1537) by examining process trees. You will also find out how these solutions can help identify who has vulnerable software or configurations on their systems by leveraging indicators of compromise (IOC) to pinpoint the depth and breadth of malware (MD5).

    View this on-demand webinar to learn how to:

    - Utilize endpoint security visibility to enrich your investigations in AWS
    - Use EDR to add thousands of host-based observables for threat hunting
    - Auto-scale threat detection across all your cloud endpoints
    - Integrate a cloud access security broker (CASB) to extend protection to cloud apps


    Who Should Attend?

    Security practitioners (Security Analysts, Security Architects, Senior Security Engineers, etc.), Cloud Security Architects, and the office of the CISO.
  • How to Build a Threat Hunting Capability in AWS
    How to Build a Threat Hunting Capability in AWS
    Shaun McCullough, SEC545 Cloud Security Architecture | David Aiken, Solutions Architect Manager, AWS Marketplace Mar 12 2020 2:00 pm UTC 53 mins
    Do you know how to build an effective threat hunting program in your AWS environment? In this webinar, you will learn how threat hunting differs from alerts and SOC monitoring, and what threats to look for. You will also discover real-life examples that demonstrate how threat hunters can apply cloud infrastructure best practices to reduce the noise in often chaotic environments, making it easier to detect potential events. Leveraging detailed use cases, this webinar can help you develop an effective threat hunting program.

    Attendees will learn to:

    - Use the threat hunting loop to identify what to look for, which tools you need to analyze available data, and ways to tease out patterns that indicate potential events
    - Strike the right balance of how much data to capture, identify gaps in information, and determine how best to collect that information
    - Analyze logs efficiently and effectively using Amazon CloudWatch, AWS CloudTrail, and Amazon GuardDuty
    - Automate the process of evaluating and enriching complex data sets by utilizing SIEM and SOAR solutions to detect possible threats

    Speaker Bios

    Shaun McCullough is a community instructor for the SEC545 Cloud Security Architecture and Operations class and gives back to his profession by mentoring and supporting the next generation of cyber professionals. With 25 years of experience as a software engineer, he has been focusing on information security for the past 15 years. Shaun is a consultant with H&A Security Solutions, focusing on secure cloud operations, building DevSecOps pipelines and automating security controls in the cloud.

    David Aiken is a Solutions Architect Manager at AWS Marketplace and is an AWS Certified Solutions Architect. He leads a team of specialist SA’s that help customers implement security and governance best practices. His skills include cloud computing, enterprise architecture, agile methodologies, web services, and software design and development.
  • Contract Compliance: An Untapped Opportunity
    Contract Compliance: An Untapped Opportunity
    Shveta Agarwal, Contract Compliance Senior Audit Manager, US | Rob Brown, Director Supplier Services, The Coca-Cola Company Mar 12 2020 6:30 pm UTC 38 mins
    Procuring materials and indirect services involves ever-greater complexities in the global supply chain and risks that can impact profits. Organizations devote significant time and effort to negotiating complex supplier contracts, however; once contracts are in place, often customers assume they’re getting the value that they were promised. A disciplined approach to contract compliance testing extracts the greatest business insights and helps recover lost profits.

    In the next installment of PRGX’s Retail Webinar Series, learn how PRGX’s Contract Compliance program applies unmatched data mining technologies and specialized global resources to conduct supplier audits and maximize the return on your hard-fought supplier contracts.

    Listeners will come away with the understanding of how a comprehensive Contract Compliance audit program can:

    - Be considered a best practice in supplier governance among best-in-class organizations
    - Identify and recover negotiated savings in strategic supplier contracts
    - Provide actionable opportunities for business insights and future cost avoidance
  • [Webinar] Zugang zu Kapital durch digitale Transformation
    [Webinar] Zugang zu Kapital durch digitale Transformation
    Andreas Thonig, Tradeshift Mar 19 2020 9:00 am UTC 60 mins
    Willkommen zu unserem Webinar, in welchem wir diskutieren, wie Sie mehr Zugang zu Kapital erreichen und die Reibung Ihrer Supply Chain verringern durch die Bewältigung der digitalen Transformation.

    Der Bedarf an Zusammenarbeit zwischen der physischen und finanziellen Supply Chain wächst. Da Supply Chains immer komplexer werden, bringen sie mehr Komplikationen mit. Deshalb müssen sie anpassungsfähiger und kooperativer werden. Der Druck macht sich überall bemerkbar, von Produzenten und Mitarbeitern, die die Logistik abdecken, bis hin zu den Teams, die das Betriebskapital verwalten.

    Um ein anpassungsfähiges Unternehmen zu werden, müssen Unternehmen ihre Supply Chain durch den Einsatz innovativer, digitaler Technologien transformieren, die die Zusammenarbeit in Echtzeit erleichtern, bessere Prozesse einzuführen und dazu beitragen, einen Mehrwert auf dem Markt zu schaffen.

    Nehmen Sie an unserem Webinar teil, in dem wir folgende Themen diskutieren:

    - Wie digitale Vernetzungen, die physische und finanzielle Welt beeinflussen
    - Wie prozessorientierte Digitalisierung Sie einschränken kann
    - Accounts Payable, welches Datenqualität und Echtzeitanalysen bietet
    - Wie Teams digitale Technologien nutzen können, um den Verkaufswert zu steigern und effektive Beziehungen zu ihren Lieferanten aufbauen
    - Methoden, wie Sie Ihr Working Capital erreichen, ohne mit Ihren Stakeholdern in Konflikt zu geraten
  • Drive Employee Productivity Through The Digital Workplace
    Drive Employee Productivity Through The Digital Workplace
    Steve Moritz, Chief Digital Officer, System Soft Technologies Mar 31 2020 6:00 pm UTC 60 mins
    Unemployment is at an all-time low. Employee attrition is at an all-time high. Competition has never been greater as digital-native start-ups are challenging legacy business models.

    The result? Organizations must find creative ways to enhance employee engagement and boost productivity. Or they wither and die.

    How? Deploying a Digital Workplace that delivers a personalized employee experience.

    Attend this webinar and learn:
    - What is a best-in-class Digital Workplace
    - How this boosts productivity, reduces attrition, enhances engagement and collaboration
    - How to introduce a personalized and self-curated digital employee experience

    You will also gain insights on:
    - Why retention matters
    - How robotic process automation plays into the solution
    - How productivity influences business growth
    - The relationship between employee engagement and productivity
    - How to start with the design and implementation of a modern digital workplace experience
  • The Top 5 Ways to Prevent Overpayments
    The Top 5 Ways to Prevent Overpayments
    Lisa Marley, Audit Manager, PRGX Apr 7 2020 5:30 pm UTC 43 mins
    In this webinar, Recovery Audit expert Lisa Marley reveals five common occurrences when it comes to overpayments and solutions to combat them.
  • Five Key Components to Managing Supplier Contracts
    Five Key Components to Managing Supplier Contracts
    Vijay Parekh, Senior Director of Delivery, Contract Compliance EMEA Apr 30 2020 5:30 pm UTC 21 mins
    Procuring materials and indirect services involves ever-greater complexities in the global supply chain and risks that can impact profits. Organisations devote significant time and effort to negotiating complex supplier contracts, however; once contracts are in place, often customers assume they’re getting the value that they were promised. Through the forensic audit of a contract and examples of a good audits right clause, the importance and often under-estimated revenue benefits of a contract compliance program will be outlined.

    In this webinar, attendees will learn 5 tips for best practices when renegotiating supplier contracts:

    1.Get the language right
    2.Make sure both parties understand and acknowledge the commercial terms
    3.Accountability and responsibility
    4.Strong Governance
    5.Relationships are important
  • A Playbook of Success for Recovery Audit
    A Playbook of Success for Recovery Audit
    Zach Braford, Director of Product Management, PRGX May 26 2020 5:30 pm UTC 22 mins
    In this webinar, "A Playbook of Success for Recovery Audit," you'll discover four ways to get the most out of your Recovery Audit. Industry expert and Director of Product Development at PRGX, Zach Braford, outlines real-life winning strategies used for our clients.

    In this webinar, we explore:

    1. How to extract more benefits by engaging in detailed audits
    2. How to increase the value of your audit by increasing the scope
    3. How to manage an audit in a global company
    4. Defining a playbook of success for your company
  • Contract Audit: The Power of Prevention
    Contract Audit: The Power of Prevention
    Jon Daniells, CCa Audit Director Cc, US | Sara Clark, Director of Product Management, US Jun 24 2020 2:00 pm UTC 59 mins
    Boosting the value delivered from your Contract Audit Program

    Traditionally, supplier contract audits have principally focused on finding past billings errors and working to recover those overbillings. However, as organizations gain a more sophisticated appreciation for the deep intelligence gained through contract audits, they are now demanding new strategies that are designed to locate errors sooner and prevent the same mistakes from being repeated. Historical recoveries, while still a desired outcome where they exist, are seen as a byproduct of the central objective, fixing problems that return even more significant value through recurring future cost savings.

    In this webinar, PRGX contract audit experts Jon Daniells and Sara Clark will recommend strategies for enhancing the value of your organization’s supplier audit program, while outlining the steps to help you recover lost profits sooner. Key takeaways from this webinar include:

    - Pathway to prevention: Learn the broad spectrum of where overpayment problems originate and how best to identify and fix the root causes

    - Supercharging your results: How evolving the maturity of your contract audit program will exponentially expand value to your company

    - From reactive to proactive: Key steps to building a program which identifies issues quicker, leading to immediate and sustained cost savings