Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Optimizing Windows Logons: IT Secrets for Speeding up End User Productivity James Rankin (EUC Expert) Optimizing logon times is no easy task. There’s lots of information available, and everyone may tell you something different, but some areas need more... 2 weeks ago | 58 mins The Keys to Sovereignty in the Cloud Romain Deslorieux: Director, Strategic Partnerships; Certified DPO; Marcelo Delima: Global Solutions Marketing, Thales The World Economic Forum estimates that over 92% of all data in the western world is stored on servers owned by very few US-based companies. This conc... 4 weeks ago | 32 mins Best Practices of Downstream Protein Purification and Product Concentration Krishnamurthy Venkatesan at Biocon Biologics, Sofie Östemar and Henrik Ihre and at Cytiva and Nigel Jackson, Pall Corporation Downstream protein purification and product concentration is known to be the most challenging part of the process development. It is also known that t... 4 months ago | 166 mins CPD: Dividend concentration risk Henry Cobbe The objective of this module is understand how to define, evaluate and mitigate dividend concentration risk within a portfolio. 7 months ago | 32 mins Best Practices of Downstream Protein Purification and Product Concentration Krishnamurthy Venkatesan, Downstream MSAT Lead, Director at Biocon Biologics. Downstream protein purification and product concentration is known to be the most challenging part of the process development. It is also known that t... September 12, 2023 10:00am Cascading and Concentration Risk In the Digital Supply Chain Bob Maley, CSO at Black Kite and Jeffrey Wheatman, SVP Cyber Risk Evangelist at Black Kite Join Bob Maley and Jeffrey Wheatman, new addition to the Black Kite team, as they discuss their perspectives of both cascading risk and concentration ... 10 months ago | 32 mins Demo: Third Party Risk Management Maya Kano, Solutions Architect As you continue to engage with vendors, security ratings can illuminate vulnerabilities in your third- and fourth- party ecosystem. Learn About: - Bu... 3 months ago | 27 mins Demo: Automatic Vendor Detection (AVD) Deep Dive Maya Kano, Solutions Architect; Vanessa Sorenson, Senior Product Marketing Manager Go beyond traditional TPRM to automate and scale your third-party and fourth-party risk management workflows. Join SecurityScorecard in this deep di... 3 months ago | 23 mins The State of Customer Success 2022 Stephen Fulkerson, VP, Customer Success Research, TSIA For customer success, 2021 was about focusing on digital customer engagement and experience while continuing to navigate the continued challenges of u... 10 months ago | 45 mins Project PARETO – DOE’s Produced Water Optimization Initiative Dr. Markus G. Drouven, Technical Director, Produced Water Optimization By 2030, oil & gas plays across the United States are expected to produce over 60 million barrels of water every day. Most of this water is characteri... 9 months ago | 58 mins Load more