Most Internet users have been in contact with malicious software (malware) and most of us understand these threats should be avoided. Far less people understand what happens when a computer is attacked, more precisely, what are the objectives of the attackers and how these attacks could affect your business?
We will present various attacks that have been recently witnessed which illustrate the different motivations of malware creators and operators. We will also show how banking trojans such as Win32/Gataka can attack on alternative operating systems such as OSX/Flashback. Finally, we will cover cases of cyber espionage with the case of ACAD/Medre.
Join Pierre-Marc Bureau, Mallware Researcher at ESET as he shows what happens in an attack and how to protect your business.
Whether you’re moving up from Quickbooks or have an enterprise level ERP, you know that you can’t mess around with tax compliance. Imagine getting ready for IPO or hit that big buy from a major Fortune 100 company – and then find that the acquisition tanks due to a major liability in mismanaged sales tax. Ouch! Unfortunately, we’ve seen it happen time and again.
Let us help you get your organization ready for the next growth phase that will put you into the three comma club. We’ve rounded up some top-notch tax experts with lots of experience working with public and private high-growth tech companies – and they’re not going to let you down in the clutch.
Tax partners Malcolm Ellerbe, David Sordello, and Jon Davies of the Silicon Valley company Armanino will sit down for an interactive chat with the VentureBeat audience – and are happy to take your questions as you navigate the ins and outs of sales tax in a mobile and startup culture.
In this webinar, you’ll:
* Gain greater visibility to common sales tax loopholes that often snag hot tech startups and entrepreneurs
* Determine whether sales tax is even an issue for your organization -- you might be surprised.
* Learn ways that international tax in growth stage companies can be the make or break point for that next IPO
* Get a high level overview of other tax considerations like net operating losses, impact of stock compensation, and the states that are currently taxing cloud computing services.
Malcolm Ellerbe, Tax Partner, Armanino
David Sordello, CPA, Corporate Tax, Armanino
Jon Davies, Tax Partner, International Tax, Armanino
Few people actually calculate the true cost of bad meetings, in fact, the Harvard Business Review discovered:
- 15% of an organization's time is spent in meetings
- 67% of meetings are rated as ineffective
- 92% of people multitask in meetings
- $32 Billion dollars is wasted in bad meetings
The reality is, meetings are still a crucial part of running an effective business. The value of effective meetings saves companies an average $2,600 per employee per year.
In this webinar, you'll learn how to save time + money through the power of Integrated Meetings, we'll show you a process we've taken over 15+ years of research to perfect and refine meetings that you can apply immediately in your company and with your team.
It’s no secret – any well-known brand you see on a regular basis is already playing with a localization strategy to increase market reach. For your message to resonate, you need to be thinking not just at a regional level, but about your global customer experience.
Localization isn't limited to simple translation -- you can't set it and forget it. Companies shouldn't assume, for instance, that a campaign created for Spain will be equally as effective to all Spanish-speaking consumers in the U.S. or Mexico. It's not just language, but cultural differences. Consider the message you might send to someone in Berkeley, California, versus one you might send to someone in Phoenix, Arizona or New York City. And once your unique branding content has been sent out to different geographies, your localization efforts aren't over just yet. True experts understand that the campaign as a whole is not a sum of its parts -- a campaign's success can be in the granular regions, creating a truly unique customer experience with that added local flavor to resonate within the audience.
We'll walk you through the most common challenges that companies make and help you improve your campaign's quality, accuracy and relevance to reach the right consumer. We'll give tips on not only improving the localization process but help you deliver better metrics to senior leadership that tell the true story of your brand’s globalization.
In this webinar, you'll learn how to:
- Re-think campaign creation at the regional level -- and the global one
- Effectively use in-market experts to drive better impact
- Make your branding as world-ready as possible.
- Use metrics to show the truest picture of your campaign's effectiveness
- Enhance the customer experience through storytelling and added local flavor
Stewart Rogers, Director of Marketing Technology, VentureBeat
Dave Fish, SVP, Expert Services, MartizCX
This webinar will consider the complementary disciplines of security, crisis, business continuity and disaster response, blending theoretical and practical applications. It should interest practitioners and students of organizational resilience at advanced levels as it will bind together the various complementary disciplines necessary to become resilient into a single holistic approach. The webinar will aim to develop insights and discussion about how to match the needs of security and risk to the requirements of business continuity and impact management; and to identify the intuitive and learned skills to anticipate, respond to and recover from the many unwanted issues that can arise and threaten organizational capability.
It will be set in the context of a dynamic, changing world where new threats such as embedded terrorism, social media risk generation, food and logistics security, environmental issues, governance and legislation (as examples) can affect resilience significantly. Many of us look at single elements – this will combine many complementary and potentially conflicting elements in a single analysis and discussion.
Data breaches strike all industries, but for the hospitality industry the stakes are extremely high, and the financial impact to a company can be significant. As an owner, controller or CFO, your responsibility now includes the safety of corporate data. We will explore how you can effectively work with IT to develop a risk management profile that protects your data and maintains your financial success.
Meet the Panel: H. Brandt Niehaus, CHB, President of Hotel Brokers International and President of Huff, Niehaus & Associates, Inc., a full-service hotel investment advisory firm. Julie Eisenhauer, CPA is a shareholder at Clark Nuber, a CPA and consulting firm in Bellevue, Washington, where she provides audit, assurance and consulting services to privately owned companies. Peter Henley, CPA, CITP, serves as Clark Nuber’s Senior Director of IT, and is responsible for aligning IT with the firm’s strategic business plan and making Clark Nuber the most technologically advanced accounting firm in the Northwest.
Discover how to gain more control over the performance of your vehicles and stop risks from harming your drivers, vehicles, and bottom line. During this webinar, you’ll learn how to significantly reduce risks—and the costs that go along with them.
If you’re a software or high tech company ready to jumpstart your growth phase, do you understand how much of your limited resources are being sapped trying to manage the tax compliance for every transaction? We didn’t think so. Sales tax compliance is probably the last thing anyone wants to think about – and yet, it can make or break your revenue stream.
We’re talking to a VP of e-commerce of a major high end retailer, a highly sought-after sales tax guru and our own CFO, each of whom have solved the sales tax compliance equation – and have figured out a way to keep the government happy while streamlining their organizational process flow. By offloading these non-value add activities, business owners, CEOs, and CFOs can focus on what really matters – kicking up all kinds of revenue and adding value back into the business while making the competition weep into their pillows each night.
Join us for an interesting hour of real-life rock stars who have solved their nightmares with innovative sales tax compliance tactics and strategies. By registering for this webinar, you’ll
* See real world scenarios of several organizations who have mastered sales tax compliance and requirements
* Learn action items to prepare your organization to optimize non-value-add business admin activities and reporting time
* Get your questions answered regarding sales tax strategies by the industry’s top experts during our live exec roundtable Q&A
* Hear the latest update on the Congressional “internet sales tax” (Marketplace Fairness Act)
Scott Cohn, Vice President of eCommerce, Chinese Laundry
Lisa Serwin, CFO, VentureBeat
Jordan Goodman, Sales and Local Tax Partner, Horwood Marcus & Berk
Register today for this free learning opportunity with VentureBeat and Avalara
Since the beginning of time, marketers have understood that location matters. From putting guys on corners wearing sandwich boards to having airplanes dragging message banners, marketers use proximity marketing to snag hot prospects and leads when the moment is hot. Knowing where your customers are has never been easier, thanks to their own smartphone's internal GPS. Now you can target those prospects who are in the same state, city or even the same block as your salesman. Through geo-fencing and iBeacons you can even send a message to them the moment they step inside your store -- or try to lure them out of your competitor's store too.
The flip side? You risk creeping out and alienating your customer base. Don't know where to start? Want that next great idea? Our experts will talk through the basics to master level geolocation triggers through mobile marketing automation in a fast-paced discussion. Register today!
In this webinar, you'll
* Learn the difference between geo-fencing, geo-targeting and geolocation
* Discover the savvy geolocation techniques being used by today's top marketers
* Integrate geo-fencing or geo-targeting technologies into your marketing strategy, regardless of budget
* Understand how competitors may be luring your customers out of your business through their own geo-fencing activities on your own home turf.
John Koetsier, VP of Research, VentureBeat
Joe Megibow, SVP/Chief Digital Officer, American Eagle Outfitters
Register today for this free discussion on how geo-location mobile marketing automation can take your marketing initiative to the next level.
Well-known writer and presenter Nathaniel Forbes MBCI offers three simple steps to help you give more persuasive presentations.
Whether you’re pitching business continuity management to the C-suite, pleading for your department’s headcount or reporting post-exercise successes, you can move your audience to action with these three steps to a persuasive presentation.
1.Develop a ‘story’.
The human brain has been wired for story since our ancestors drew on cave walls. Every disaster, every invocation, every successful recovery reveals stories of sacrifice, personal resilience and individual initiative. Behind the facts, there’s a story in your presentation, too – one your audience will remember.
2.Make an emotional connection.
People may forget what you said, they may forget what you did, but they’ll never forget how you made them feel. To move people to action - to make them care about business continuity - you must reach for their feelings. Gently…but intentionally.
It’s impossible for anyone to read and listen at the same time. Speaking over text bullets on a screen behind you is distracting and confusing to the audience. Instead, choose powerful images that make your point and support your story. The best ones are often the photographs you take yourself.
Dealing with what most businesses would classify as emergencies or serious incidents on a regular basis, the Armed Forces and emergency services have a high degree of built-in resilience, being primarily structured for contingencies. Having moved into business continuity after serving 10 years in the British Army Intelligence Corps, Laura Mazzara shares some of the key lessons she has identified from her Army experiences, and how they can be applied to business continuity. Charlie Maclean-Bristol will consider these lessons from a training perspective and how they can be practically applied to BC training.
End users are increasingly shifting their IT services to managed service providers and the scope of both technology and services offered by MSPs is constantly evolving. Join ESET and LabTech Software, the industry-leading IT automation software, as we explore these changes and what it means for businesses.
The EMV Compliance Mandate is set to take effect in the United States in October 2015. These new credit card processing procedures mean big changes for retailers and businesses. Is your company ready? Find out what you need to know.
Is antivirus dead? Absolutely not. Join Distinguished Researcher, Aryeh Goretsky, as we explore how antivirus is evolving to adapt to modern threats and why it is still a critical layer to a complete security solution. This webcast will look at trends reported at the annual Virus Bulletin conference in Prague.
Security Researcher, Cameron Camp, discusses seven ways in which malware threatens your virtual systems and the increasingly mission critical data and services that those systems handle. Given a thriving black market in stolen information, and the wide availability of the tools with which to acquire it, no virtual attack vector is likely to be neglected by the bad guys, from compromised executables in virtual server images to virtual networking connections between mobile end points. Drawing on the latest malware research, Camp looks at how malicious code is adapting, and may be adapted, to penetrate virtual systems.
Your company can learn valuable lessons about risk strategy and incident response from what happened to Hacking Team, a firm that supplies surveillance tools to government agencies. Widely accused of helping governments spy on dissidents and journalists, Hacking Team found itself hacked with embarrassing, possibly damaging results. ESET senior security researcher Stephen Cobb explains the missteps made and the lessons to be learned during this webinar.
•How Hacking Team’s mistakes mirrored those made by Sony
•How employees’ weak passwords helped facilitate the breach
•How transparency would have helped Hacking Team’s credibility
•Why every company must review what might be exposed in a breach
Join ESET and National University as we explore options for education and career advancement in the field of cybersecurity. Christopher Simpson, the Director for the National University Center for Cybersecurity and Information Assurance program will look at the evolving technology job field and what specific cybersecurity related skill sets employers will want to look for.
Information technology brings many benefits to a business, but it also brings risks. Knowing how to assess and manage those cyber risks is essential for success, a powerful hedge against many of the threats that your business faces, whether you are an established firm or pioneering startup. ESET security researcher Stephen Cobb explains how cyber risk assessment and management can work for you.
Mobility can be a challenge for small businesses, especially when it comes to managing various devices and keeping them secure. ESET Security Researcher, Cameron Camp, explores mobile device management, BYOD and other challenges discussed during National Small Business Week.
Is your business prepared for a disaster? Join ESET and industry expert, StorageCraft, for a research overview presentation of modern business disasters. We'll look at the difference between back up and recovery and discuss best practice for building a recovery plan. Mike Kunz, VP of Sales with StorageCraft, will also look at specific solutions to quickly get your business up and running when disaster strikes.
Lysa Myers, Security Researcher III, ESET North America
ESET security researcher Lysa Myers discusses developments in healthcare IT system security that you may see at the HIMSS conference in Chicago next week. Find out what is being done to better protect patient data privacy and more.
Ayreh Goretsky, Distinguished Researcher, and Don Lewis, Product Marketing Manager, ESET North America
Advanced persistent threats (APT) are a growing concern to the world's companies and networks. This presentation will give an overview on how they work and examine real-world data breaches resulting from APTs. We'll also look at how multi-layered proactive detection can combat this threat and offer a product overview of how ESET's powerful endpoint solutions respond to APTs.
Category: Research overview and ESET product presentation.
Dave Howard, Instructional Designer, ESET North America
From unobtrusive advanced malware detection technologies to automated threat response and actionable mobile-friendly dashboard – manage security from any device, any time, ESET will present new solutions for securing your endpoints and new ways to manage them.
Cybersecurity legislation and related issues received unprecedented attention in President Obama’s 2015 State of the Union address, but what does this legislative agenda mean for businesses? Will your organization’s IT security strategy be impacted? Ahead of the Summit on Cybersecurity and Consumer Protection at Stanford on February 13, security expert Stephen Cobb offers answers to these questions and his perspective on cybercrime deterrence.
What were the biggest takeaways from the annual CES Conference this year? Join Security Researcher, Cameron Camp, as he examines the new technology presented at the show and offers an insider take on the associated security concerns including Internet of Things, privacy security, wearables and more.
How is the landscape changing for cyber security and what do businesses need to know to protect themselves? From large scale data hacks to credit card breaches, Sr. Security Researcher, Stephen Cobb, looks at the major trends in cyber security for the upcoming year and discusses the tools and resources available to protect against them.
The potential benefits of mobile medical technology and telemedicine are enormous, from to better quality of life to saving lives, not to mention controlling healthcare costs. Yet keeping data safe when it is beyond the confines of hospitals and clinics is a serious challenge, one that cannot be met merely through regulatory compliance, as ESET Security Researcher Stephen Cobb explains.
Keeping you and your business safe from IT security threats
ESET's Cybersecurity series is designed to connect you with the experts. As an IT Security professional you will gain access to analysis and commentary from industry experts on the Cybersecurity front. Join ESET's channel now >>