Establish & Integrate a Proactive, End-to-End Compliance Program
IT Security requires a proactive approach to the latest threats that can impact an organization. As security professionals, we have several options available to us to keep up on the latest security threats that will impact an organization. The security threats and impacts to an organization can be w
IT Security requires a proactive approach to the latest threats that can impact an organization. As security professionals, we have several options available to us to keep up on the latest security threats that will impact an organization. The security threats and impacts to an organization can be world-wide and these threats know no boundaries. Compliance impacts are also evolving. We have seen since the growth of the internet, that many countries, U.S. States, Industries, etc. are now developing their own rules that impact how IT governance should be administered in organizations. If security and compliance organizations do not stay on top of these developing compliance trends, the impact of compliance changes can have a negative effect. A proactive approach to compliance is required along with some help from your legal department! After all, compliance "threats" know no boundaries!
RecordedOct 28 201046 mins
Your place is confirmed, we'll send you email reminders
Today’s consumer has digital connectivity at their fingertips 24/7, and they are flocking to social networks for customer care. Twitter alone recently reported a 250% increase in customer service-related content over the past two years, and 60% of these consumers expect a response within an hour or less. However, many if not most of these messages continue to be ignored.
What’s the problem? Social media ownership was first tucked under Marketing, with a focus on branding and campaigns, but customer care queries through social networks continue to surge. Most Marketing teams are not trained to deal with customer service and do not prioritize these mentions. This disconnect is growing, and the failure to integrate and include customer service in overall social strategy is having a negative impact on company bottom line.
Join this webinar and learn why it’s imperative for Customer Service and Marketing to collaborate on social media efforts to provide the best customer experience. We’ll cover the key considerations for developing a mutually beneficial program, and discuss how strong social care drives brand advocacy and overall revenue.
Optimize. Connect. Analyze. We’ve all heard the social media buzz words, but how can we move beyond lingo and actualize an effective social media strategy that doesn’t bore the already short-attention-spanned customer?
Given that the average person receives roughly 200 emails per week, how can we get them to care about our bikinis and personalized soaps (aside from using Kim Kardashian as a model)? This in-depth interactive executive learning session can help you fuel a high powered fast and effective social media strategy that does more than buzz and ping.
In this webinar you’ll learn how to create a social media strategy that is unique to your corner of the universe, including how to:
* Differentiate between social media and social messaging
* Utilize analytics to optimize your results
* Empower rather than manage your social media by becoming more effective with the tools at your disposal
* Optimize social media spending to gain the attention of new audiences
* Engage social influencers by using the right tools and approaches
* Craft and deliver the right content and promote it -- beyond finding and sending
* Itamar Benedy, VP of marketing, Yoga.com
* Stefania Pomponi, Chief Evangelist, Clever Girls Collective
* Andrew Grill, Global managing partner, IBM Social
* Stewart Rogers, director of marketing technology, VentureBeat
* Wendy Schuchart, moderator, VentureBeat
After analyzing millions of customer interactions, Sykes has identified operational areas that require attention to REALLY cause change to the customer experience. During this interview, Bo Young, Sr. Director, Insight Analytics, has promised to reveal those areas and share key tactics for you to take away and bring back to your own company.
Whether you have an offline business with an online element or you have a 100% online business, this webinar is for you my friend.
You see, there are many elements that need to be in place for an online business to be a success, but it's so easy to lose sight of them when you get stuck in the day-to-day.
Sometimes it get's so overwhelming you forget the reason you started your business in the first place (remember that thing you were REALLY passionate about right at the beginning?).
Shall we try to recapture that passion and push you closer to your goals by sorting out a few fundamentals?
In this webinar we're going to look at some essential elements you can put in place to bolster your business and help you to get the results you crave.
From managing your mindset, setting goals, positioning and pricing to digital strategy, funnel creation, outsourcing and growth plans. I'll share some of the key elements I've learned in my 10 years of working with online business owners and the success I've had with my own businesses (which makes me proud as punch).
It used to be you could put up a blog, create a white paper or come up with a slick infographic, and claim you’re doing content marketing. Oh, for the easy days.
Now, in our multi-channel, hyper-social, personalized landscape, content marketing has gotten a lot more complex and far more strategic. And as customers have seized more control of the conversation -- and traditional advertising continues to lose its clout -- content marketing has become an undebatable marketing tool for both lead generation and brand awareness.
But given how essential it has become, customers are being carpet-bombed with content. How do you rise above the noise? What channels are essential? How do you maintain relevance? What forms of content are most effective? And how do they fit into a comprehensive marketing plan, not to mention the customer journey at all its junctures?
Join our panel of content marketing experts and VB’s Director of Marketing Technology research to learn essentials no marketer should be without as they head further into 2016.
In this webinar, you’ll:
• Design a content marketing program that complements your marketing initiatives
• Find your voice – and how to adhere to it across media and platforms
• Learn which internal professionals to target for particular platforms (and how to get them to agree to do it)
• Uncover the benefits of content marketing, such as lead generation, expanded social presence, cementing brand recognition, and building individual executives' brands
• Determine the ROI of content marketing, plus the tools and metrics to use.
* Stewart Rogers, Director of Marketing Technology, VentureBeat
* Ada Pia d'Errico, CMO, Patch of Land
* Sonny Ganguly, CMO, Wedding Wire
* Wendy Schuchart, Moderator, VentureBeat
All things around us are coming to life with sensors and Internet connectivity. As a result there is the opportunity in this new world to create disruptive innovations to enhance your customer value. Plenty of questions arise as a result.
Where do you create value and how can you make technology the enabler of your connected customers journey?
What role does data play and help autonomous machines make decisions to change our lives, industries and future.
How can you tap into this to build customer intimacy and understand customer intent to serve them better?
Sudha Jamthe is a technology futurist, CEO of IoT Disruptions, an instructor at Stanford Continuing Studies and author of "IoT Business Primer Book" and "IoT Disruption 2020." She is a thought leader in IoT space, focusing on guiding companies with innovation to adopt IoT and to build ecosystems for Digital Business Transformations. She shares her research on IoT with her weekly "The IoT Show" on YouTube.
Sudha serves on the advisory board of Blockchain university and Barcelona Technology School.
Learn how to use visual marketing and earned content to drive sales through social
According the 2015 Customer Acquisition Barometer social media is not working to acquire customers. Yet.
This doesn’t mean that social media advertising is worthless – far from it. Social can play a decisive part in the success of failure of your campaign.
Join Olapic’s director of account management, EMEA, Becky Dutta. She will explain how to convert bystanders to buyers, using social media. Learn:
Video and photo advertising
The differences and benefits with Facebook, Atlas, Instagram, Twitter and Bloggers
How to identify highest converting visual content
A-B testing on social
UX: from ads to purchase
Case studies on successful ad campaigns
In addition, Becky will present a case study on Unilever’s Magnum ‘Pleasure Store’.
At the end of this series you will be able to run a visual marketing strategy that supports conversion, engagement and loyalty for your brand.
Take each webinar as a training session. Test your knowledge at the end of each one and, by the end, you can obtain a Visual Marketing Series certificate of completion.
Sign up now for the low-down on social media advertising
Did you know that social media exploitation is the most commonly used technique to gain unauthorized access to an organization?
This was a finding of Cisco’s 2015 Midyear Security Report.
This means that - as the guardian of the corporate brand and owner of many external communication channels - marketing needs to play an active role in protecting the business from cyber threats.
In the age of data-driven marketing, companies are collecting and storing more customer information than ever before, while – at the same time – marketing tactics like online advertising and social media outreach have increased organizations’ attack surface.
Phishing, hacking, mimicking, click and ad fraud, malware distribution, impersonation, social engineering…the list of possible malicious actions goes on and on and new ones keep emerging. Corporate ransomware cases are grabbing the headlines, where “hostage takers” have the power to destroy trust and potentially a whole business.
ARE YOU PREPARED?
In this webinar, a panel of industry experts will:
•Outline the most common cyber threats to brands, including
phishing, social engineering, website defacement and compromise,
corporate impersonation, hacking, click fraud, and insider threats
•Provide solutions to detect and mitigate threats
•Offer best practices for threat prevention
If you are in a marketing role and want to educate yourself about cyber security, this webinar is for you.
Learn what you can do to protect your brand from malicious actors. You can’t afford not to.
According to InfusionSoft's 2015 Small Business Survey, lead generation is a huge focus for SMB’s. Yet most SMB's spend less than $1,000/month on marketing activities. Small wonder that 55% of business owners also cite time management as one of their biggest challenges.
Research has proven that video marketing is the most effective way to generate and nurture quality leads. But how does a small business take advantage of this powerful tool without breaking the bank, or stretching themselves too thin?
In this conversation, the BrightTALK Studios and marketing team discusses techniques to create effective, budget-friendly video content. We also explore how to sell the idea of video to your boss, and how to use external vendors to best effect.
A picture is no longer worth “a thousand words.” In fact, Forrester’s VP Principal Analyst, Dr. James McQuivey, recently valued one minute of moving pictures, (aka video/animation) as being worth more like “1.8 million words!”
People are visual learners. That’s why, in a world where B2B stories are increasingly growing more complex and data-centric, content marketers are turning to animation - and succeeding. Animated ads with just 6 to 9 seconds of animation are averaging 138% higher conversion rates than those without, according to Rocket Fuel’s Guide to Creative Optimization. Animation is no longer just for Pixar and Dreamworks. It’s also for you and your business.
Join us on the BrightTALK Academy as we delve into some of the strategies and tactics for leveraging animation to increase the impact of your content marketing programs. In the webinar you will learn to:
- Maximize your speed to meaning in the world of “8-second attention spans”
- Strategize the types of stories that best lend themselves to animation and why
- Captivate new audiences through multiple animation formats
- Generate more conversions with some simple animation tactics
Mathieu Gorge, VigiTrust; Terence Spies, HPE Data Security; Derek Brink, Aberdeen Group; Dan Fritsche, Coalfire
There is a substantial cost associated with reaching and maintaining PCI DSS compliance requirements, but the cost of non-compliance is often much greater. While the initial cost of the technology, staff and other resources necessary to implement satisfactory controls has its price tag, it is vital that all organizations affected by the PCI standard consider both the short and long-term costs of non-compliance as well as the benefits to meeting the requirements.
This is especially important as PCI DSS evolves and increase in complexity as the standard moves towards becoming a federal regulation. The costs of non-compliance can far exceed the cost of systems to bring a company into compliance, as demonstrated by so many high profile data breaches. Join this executive panel as we discuss ways to prevent costly cases of non compliance with PCI DSS.
Melinda Rahe, Business Continuity Program Manager Dell, Inc.
Outsourcing shifts the burden to mitigate risk to the vendor. But, it does not shift the impact of the risk. Your company’s reputation and its’ customers can be negatively impacted when your vendor experiences failure.
This presentation discusses how to formulate a vendor resiliency strategy. And, will equip participants with practical solutions for effectively, as well as efficiently, assessing the business continuity risk exposures introduced by outsourcing business functions
It doesn’t matter what industry vertical you are in or how big or small your business is, we are all plagued by the same concern, the security of your most valuable asset – your data. Moreover, the threat is sometimes the ones that you trust most, namely people that have access to your privileged information and data. This insider threat can be your customers, partners and even your employees that accidentally or purposefully release or acquire sensitive data and use it for something other than what it was meant for.
Just imagine if you had a complete and panoramic scene sizeup along with the ability to proactively address potential threats of both the traditional threat vector of outsiders gaining information as well as the increasingly common and dangerous internal threat. Join us as we discuss this important topic as well as how you can ensure that your organization does not find itself in the eye of the security cyberstorm..
Mike Reinhart is the Director of Product Marketing at Accelops
Regulatory compliance and security breach protection, is complex in today’s organizations, and this job is not getting easier.
One of the major challenges that many organizations and managed security services routinely face is that the sources, numbers and types of attacks being generated are increasing exponentially. When you add the growing unknowns associated with the Internet of Things (IoT) it becomes exceedingly difficult to separate the truly lethal threats from the merely mundane. This results in greater complexity and higher costs in terms of not only the number of security incidents that need to be investigated, it is driving organizations to hire the security expertise needed to maintain these services.
Join us for this webcast to see where state-of-the-art SIEM tools are being used to create a modern managed security service that not only scales to meet the potential threats for organizations, but also allows Managed Service Providers to deliver higher quality managed security services.
John Meegan, Candice Campbell, Gary Zein, Karolyn Schalk, Karl Scott, Mike Edwards from the CSCC
The Cloud Standards Customer Council will define hybrid cloud computing, explain why this deployment model is essential for addressing business requirements, and outline the key considerations that customers must take into account as they start their transition. The presentation will include strategic and tactical activities for decision makers implementing hybrid cloud solutions. It will cover all the essential technical considerations for hybrid cloud deployment including integration, connectivity, governance, management, security and privacy.
CloudLock: Brad Pielech - Integrations Architect, CloudLock OneLogin: Mario Tarabbia - Director of Sales Engineering
Your organization has turned to cloud platforms and applications (including SaaS, IaaS, PaaS, and even IDaaS) to meet business needs, and it’s your job to make sure those applications are both easily accessible as well as airtight. Luckily, a new set of identity and security solutions have arrived that ensure fast access and security around all your publicly accessible data,w the apps it resides on, and the users engaged.
Find out how OneLogin’s identity and access management capabilities including single sign on (SSO), combined with CloudLock’s cloud cybersecurity solution can make users more secure and productive in the cloud, no matter the data, applications, or people they work with.
Join OneLogin and CloudLock to learn how to:
– Identify the top five cyber threats to your cloud environment
– Protect against cloud security risks leveraging advanced user behavior analysis
– Improve company-wide productivity through streamlined identity and access management
– Easily automate your cloud access management process
– Put it all into action quickly – managing cloud application security with a powerful IDaaS+CASB joint solution
Steve Piper, CEO at CyberEdge and Lane Roush, Systems Engineer at Code42
The CyberEdge 2016 Cyberthreat Defense Report (CDR) provides a penetrating look at how IT security professionals perceive cyberthreats and plan to defend against them. Based on a November 2015 survey of 1,000 IT security decision makers and practitioners, the CDR delivers insight IT security teams can use to compare their perceptions, priorities and security postures to that of their peers.
Join Steve Piper, CEO at CyberEdge and Lane Roush, Systems Engineer at Code42 to review the results from the 2016 Cyberthreat Defense Report and:
•Understand why 62 percent of organizations expect to be breached this year.
•Learn which cyber threats are of the utmost concern to the enterprise in 2016.
•Explore how Code42 CrashPlan endpoint backup helps safeguard your most important asset–data!
Carl Lehmann (451 Research), Rick Caccia (Delphix), Bill Laberis(IDG)
BEST PRACTICES TO MODERNIZE IT PROJECTS AND MITIGATE BUSINESS RISKS
As workloads, data and processes shift across on-premises, hybrid clouds and mobile infrastructure, enterprises must develop a strategy to manage IT change and the risk that comes with it. Attend this webinar to learn:
How to craft an IT modernization strategy for the enterprise architecture
How to select the tools to control risks associated with IT modernization
Case studies of global firms that have successfully modernized their infrastructure to enable business and IT transformation
Mitch Sherfey, Principal Product Manager, Data Center Automation
Join us for an exclusive preview of the new BMC product developed to address your security needs! Watch and see how you can eliminate risks and reduce your attack surface by providing Operations teams with actionable data combined with automation. Help your Security and Operations teams address threats and vulnerabilities based on impact and priority.
Watch as Principal Product Manager Mitch Sherfey demonstrates how the tool:
- Provides a customized “to do” list to address threats based on policy and impact – ensuring the most critical issues are fixed first
- Offers Security teams a first-time ever view into operational plans – providing visibility into planned actions, predictive SLAs, and burndown views
- Creates an automated and standard process for Security and Operations teams to enable the relentless pursuit of threats
Ryan Linn, Director of Advanced Tactics and Countermeasures
Tools and policy frameworks are only as good as the people who implement and support them. Automated mechanisms can only go so far before they rely on human intelligence to drive the appropriate reaction. The controls required by security frameworks and the data they generate, however, are overwhelming, and finding the right security talent can feel impossible.
Organizations often choose to prioritize the implementation of their security program components on the basis of risk. By identifying potential impacts and attack vectors, it’s easier to identify the controls that produce the biggest return on investment. Training your staff to understand what they see when they see it, and how to respond proactively, will help you build a security organization that is resilient in the face of evolving threats and identify any controls gaps you have while you execute your security roadmap.
This webinar will talk about how organizations can evolve beyond the compliance checklist and overwhelming scanner results by employing threat simulations. We will discuss how threat simulations differ from penetration testing, how they can be used to help make your organization stronger, and how they can replace traditional penetration testing as part of a security program.
We will focus on a discussion of attack chains, mapping methodologies to real world threats, and then look at a sample attack to see how a nominally compliant system can still be compromised.
Adrian Sanabria, Senior Analyst, Enterprise Security, 451 Research and Abhay Kulkarni, VP Engineering, Netskope
Cloud adoption is quickly becoming a must-have for enterprises, as organizations clamor to exploit the cost savings and increase in collaboration and productivity that are now established benefits of many cloud apps But at the same time, this rise in adoption – of which corporate IT has underestimated the scope by as much as 10x - has created a new effect: a “cloud attack fan-out.” Between many connected devices, which increase the attack surface, and capabilities like sync and share, which increase data velocity in the cloud, both the propensity and the severity of a breach rise.
Attend this webinar with Adrian Sanabria, Senior Analyst, Enterprise Security, 451 Research and Abhay Kulkarni, VP Engineering, Netskope for a spirited discussion that will explore the following:
- Trends in the market related to cloud adoption and the steps being taken to address security concerns;
- How to securely enable the use of cloud services for enterprise employees;
- A “how to” for identifying data breaches in an enterprise cloud environment using advanced anomaly detection techniques;
- Best practices for mitigating breaches as well as monitoring and protecting sensitive enterprise data in the cloud.
Rebecca Herold (The Privacy Professor); Duncan Jones, Forrester; Yo Delmar, MetricStream; Neil Hooper, Rsam
In a landscape filled with new threats and regulations managing the risks of 3rd party vendors is vitally important. Most financial institutions have tens of thousands of supplier relationships, and many data breaches originate through IT Vendors within the supply chain. Compounding this dilemma, regulators including OIG, OCC, FFIEC and others are increasing their focus on potential 3rd party risks. They want to see organizations proactively identifying potential risks, verifying that business partners providers and their employees are compliant, monitoring for changes that might create new risks or compliance gaps, and managing the investigation and remediation of incidents.
During this webcast our panel will specifically address the practical 'how to's' around identifying and reducing the risks of 3rd party vendors, and we will focus on:
- Typical risks resulting from third party relationships
- Common deficiencies of vendor management practices used during the on-boarding process, and the life of the relationship
- Moving from a reactive to a proactive (preventative) vendor management process
- Real world examples will be used to illustrate the key points and recommendations
It’s unmistakable. Organizations both big and small are moving to Big Data because of the information they can gather and leverage. This data is so valuable because of the insights it provides and its ability to better position the company with the customer as well as the board. But these are not the only groups that are interested in Big Data. Criminals, miscreants and evildoers are also interested in getting their hands on this information to exploit credentials and other secret information for their own gain.
In this session, we will discuss the common security issues that companies must deal with when moving to Big Data, as well as key steps you can take when deploying NoSQL to ensure that Big Data works for you rather than opening additional vulnerabilities in places you may have never considered.
Terry Ray, Chief Product Strategist and Cheryl O'Neil, Product Marketing Director
Exploding data growth doesn’t mean you have to sacrifice data security or compliance readiness. The more clarity you have into where your sensitive data is and who is accessing it, the easier it is to secure and meet compliance regulations.
Attend this webinar to learn how to:
* Detect and block cyber security events in real-time
* Protect large and diverse data environments
* Simplify compliance enforcements and reporting
* Take control of escalating costs.
Today, organizations are under constant attack. At the same time, the landscape is constantly changing with new threats arising and laws evolving. The national conversation around technology, security and privacy is as complex as ever. In this session Bret Arsenault will discuss Microsoft’s unique approach to cybersecurity and what Microsoft is doing to make the world a safer place.
Customer Convo: Threat Analysis, Security Strategy & Governance, Data Security & Compliance, Risk Mitigation, IT Management, Device Protection, People Protection, Platform Protection
Julia White, General Manager, Cloud & Enterprise, Microsoft
Join this session to see the Microsoft security platform in action. General Manager for Cloud & Enterprise, Julia White, will demonstrate the security features of Windows 10, Azure and Office 365 that can help you keep your organization secure.
Customer Convo: IT Management, Device Protection, People Protection, Platform Protection
Andrew Conway, Sr. Director, Product Marketing, Enterprise Mobility; Alym Rayani, Group Product Manager, O365 Security
With 300 billion user authentications, one billion device updates and 200 billion analyzed emails each month, Microsoft has a unique perspective on security. Microsoft has an equally unique security posture with which it protects against, detects and responds to threats. Join this session to learn how Microsoft’s comprehensive security platform can help keep your organization secure.
Customer Convo: IT Management, Device Protection, People Protection, Platform Protection
Increasing expectations for good governance, effective risk management and complex demands for legislative and regulatory compliance are presenting a growing challenge for organizations of all sizes. Tune in to live and recorded presentations by respected luminaries in the fields of governance, risk and compliance. Their thought leadership will provide you with practical advice on how to implement successful GRC strategies and processes for your organization.