Hi [[ session.user.profile.firstName ]]
Sort by:
    • DOL's New Conflict of Interest Regs: Game Changer for Retirement Advisers
      DOL's New Conflict of Interest Regs: Game Changer for Retirement Advisers Brad Bondi, Michael Wheatley Recorded: Jul 14 2016 5:00 pm UTC 54 mins
    • In April 2016, the Department of Labor issued final regulations expanding the definition of “fiduciary” for advisers to retirement plans, including advisers to IRAs and ERISA plans. Some advisers and financial institutions who previously were not considered fiduciaries now will be required to meet a fiduciary standard of care and, unless an exemption applies, may not engage in so-called “prohibited transactions” that create potential conflicts of interest (e.g., receiving compensation from third parties in connection with a transaction involving an IRA or an ERISA plan).

      The DOL also created a key exemption known as the Best Interest Contract Exemption (“BIC Exemption”). In general, the BIC Exemption allows advisers to engage in otherwise “prohibited transactions” as long as certain criteria are met. The new regulations will be phased in over time. The new definition of “fiduciary” will apply on April 10, 2017. The entire regulatory package will apply on January 1, 2018.

      In this Webcast, Brad Bondi (a partner at Cahill Gordon & Reindel LLP who leads the securities enforcement and regulatory practices) and Michael Wheatley (an associate at Cahill) will address issues concerning the new regulations, its impact on the financial services industry, best practices for financial services firms and lawyers to prepare for this new regulatory scheme, and pitfalls to avoid.

      Read more >
    • In-depth Analysis Behind the Syrian Conflict's Digital Front Lines
      In-depth Analysis Behind the Syrian Conflict's Digital Front Lines Nart Villeneuve (FireEye), Daniel Regalado (FireEye), John Scott-Railton (The Citizen Lab) Recorded: Feb 25 2015 4:00 am UTC 60 mins
    • FireEye recently released a new report “Behind the Syrian Conflict’s Digital Frontlines” that documents a well-executed hacking operation that successfully breached the Syrian opposition.

      Between at least November 2013 and January 2014, the hackers stole a cache of critical documents and Skype conversations revealing the Syrian opposition’s strategy, tactical battle plans, supply needs, and troves of personal information and chat sessions. This data belonged to the men fighting against Syrian President Bashar al-Assad’s forces as well as media activists, humanitarian aid workers, and others within the opposition located in Syria, the region and beyond.

      We have only limited indications about the origins of this threat activity. Our research revealed multiple references to Lebanon both in the course of examining the malware and in the avatar’s social media use. While we do not know who conducted this hacking operation, if this data was acquired by Assad’s forces or their allies it could confer a distinct battlefield advantage.

      Join us for a roundtable discussion with subject matter experts where we’ll talk about the details of the report and explore surrounding topics, to include:

      • An overview of the conflict in Syria and why cyber-espionage is an increasingly important factor
      • An in-depth analysis of a critical breach of the Syrian opposition including an overview of the tools and techniques used by the threat actors

      Find out more and learn from this Syrian report how you can defend yourself against these cyber attackers

      Read more >
    • Behind the Syrian Conflict's Digital Front Lines
      Behind the Syrian Conflict's Digital Front Lines Nart Villeneuve (FireEye), Daniel Regalado (FireEye), John Scott-Railton (The Citizen Lab) Recorded: Feb 19 2015 4:00 pm UTC 59 mins
    • FireEye recently released a new report “Behind the Syrian Conflict’s Digital Frontlines” that documents a well-executed hacking operation that successfully breached the Syrian opposition.

      Between at least November 2013 and January 2014, the hackers stole a cache of critical documents and Skype conversations revealing the Syrian opposition’s strategy, tactical battle plans, supply needs, and troves of personal information and chat sessions. This data belonged to the men fighting against Syrian President Bashar al-Assad’s forces as well as media activists, humanitarian aid workers, and others within the opposition located in Syria, the region and beyond.

      We have only limited indications about the origins of this threat activity. Our research revealed multiple references to Lebanon both in the course of examining the malware and in the avatar’s social media use. While we do not know who conducted this hacking operation, if this data was acquired by Assad’s forces or their allies it could confer a distinct battlefield advantage.

      Join us for a roundtable discussion with subject matter experts where we’ll talk about the details of the report and explore surrounding topics, to include:

      • An overview of the conflict in Syria and why cyber-espionage is an increasingly important factor
      • An in-depth analysis of a critical breach of the Syrian opposition including an overview of the tools and techniques used by the threat actors

      All webinar attendees will receive a free copy of the new Syrian report. Register today!

      Read more >
    • Be better at managing conflict under stress
      Be better at managing conflict under stress Dr. Ralph H. Kilmann Recorded: Jun 5 2013 2:30 pm UTC 60 mins
    • The co-author of the TKI assessment will provide a deep understanding of how the increasing levels of stress experienced in the workplace can not only prevent people from using the best conflict mode in a given situation (competing, collaborating, compromising, avoiding, or accommodating), but can also push people to react blindly to conflicts with fight, flight, or freeze.

      Join Dr Ralph Kilmann on 5 June to find out how you can help people maintain moderate stress (neither high nor low), enabling them to manage their conflicts mindfully and thus successfully.

      Read more >
    • Combining the TKI and MBTI® Assessment Tools
      Combining the TKI and MBTI® Assessment Tools Dr. Ralph Kilmann Recorded: Sep 19 2012 2:30 pm UTC 61 mins
    • For four decades, Dr. Ralph Kilmann has been using the MBTI and TKI tools to help organizations identify and then resolve their most troublesome problems.

      His approach starts by bringing recurring and unresolved differences between people out into the open, using four MBTI type groups (based on the functional pairs ST, NT, SF and NF). Once these differences have been identified, the TKI’s five conflict modes are used to develop an effective resolution for all concerned.

      In this one-hour webinar, Dr. Kilmann will describe how the combined TKI and MBTI assessments offer a powerful toolkit for solving complex problems and conflicts.

      Read more >
    • Inherent Conflicts - U.S. Investigations & E.U. Data Privacy Laws
      Inherent Conflicts - U.S. Investigations & E.U. Data Privacy Laws FTI Consulting and Main Justice Recorded: May 5 2011 5:00 pm UTC 61 mins
    • From whistle blower allegations, government inquiries and subpoenas, to corporate due diligence, Foreign Corrupt Practices Act (“FCPA”) violations, and financial fraud – corporate counsel must collect and produce greater amounts of data from around the globe. Besides basic logistical issues, various tiers of data privacy restrictions complicate the process, requiring an in-depth knowledge of data storage technology and practices, multinational data transfer regulations, and general e-discovery best practices. For example, if data is required in response to a regulatory request in the United States, yet the custodians are based in France and Germany, how can the data be collected and reviewed in a defensible manner in compliance with EU as well as French and German data privacy laws? This program will outline the key considerations and best practices for collecting and assessing data in a defensible and secure manner.

      Read more >
    • From RAM to Reality
      From RAM to Reality Tom Finney and Matthew Webster, Counter Threat Unit security researchers at Dell SecureWorks Recorded: Mar 8 2016 2:00 pm UTC 56 mins
    • Observations of Geopolitical Conflicts Transitioning to Cyberattacks

      Geopolitical conflicts are more publicly transitioning into the cyber realm. With current conflicts, a cyber-component is almost always included – and the outcome can be observed in the physical world. What is the impact of these events? Can it expose trade secrets? Shut down financial markets? Or worse?

      During this interactive webinar, Tom Finney and Matthew Webster, Counter Threat Unit security researchers at Dell SecureWorks, will cover known events, discuss the actors behind them and generally talk about the potential impacts from these threats.

      In addition you will:

      - Understand the relationship between specific geopolitical events and cyberattacks
      - Learn about the actors behind these cyberattacks and the impact to your businesses
      - Get insight into the latest attack trends
      - Receive recommendations on security solutions and threat intelligence to help protect your network

      Read more >
    • From RAM to Reality
      From RAM to Reality Tom Finney and Matthew Webster, Counter Threat Unit security researchers at Dell SecureWorks Recorded: Mar 8 2016 7:00 pm UTC 55 mins
    • Observations of Geopolitical Conflicts Transitioning to Cyberattacks

      Geopolitical conflicts are more publicly transitioning into the cyber realm. With current conflicts, a cyber-component is almost always included – and the outcome can be observed in the physical world. What is the impact of these events? Can it expose trade secrets? Shut down financial markets? Or worse?

      During this interactive webinar, Tom Finney and Matthew Webster, Counter Threat UnitTM security researchers at Dell SecureWorks, will cover known events, discuss the actors behind them and generally talk about the potential impacts from these threats.

      In addition you will:

      - Understand the relationship between specific geopolitical events and cyberattacks
      - Learn about the actors behind these cyberattacks and the impact to your businesses
      - Get insight into the latest attack trends
      - Receive recommendations on security solutions and threat intelligence to help protect your network

      Read more >
    • Defense One Summit 2016
      Defense One Summit 2016 Defense One | Underwritten by: Marklogic Recorded: Nov 17 2016 1:15 pm UTC 129 mins
    • At the 4th Annual Defense One Summit, global security leaders will gather to explore three themes — Crisis, Conflict, and Continuity — as the American presidency shifts to a new commander in chief.

      As the war on terrorism rages on, senior officials will sit with national security journalists to discuss their views, goals, and predictions about a range of issues, from daily combat in Iraq to the grand-strategy games of the great powers, and the challenges of managing budgets, equipment, and people as they shift to a new administration.

      Join Defense One on Nov. 15 for a special Leadership Briefing to kickoff this year’s Defense One Summit. Adm. Harry Harris, Commander of the U.S. Pacific Command is sitting down with Kevin Baron, Defense One Executive Editor, for a one-on-one conversation covering the challenges and future of the Pacific Command. Click here to learn more and register for this event.

      Read more >
    • Defense One Summit 2016 - Afternoon Session
      Defense One Summit 2016 - Afternoon Session Defense One | Underwritten by: Marklogic Recorded: Nov 17 2016 5:45 pm UTC 243 mins
    • At the 4th Annual Defense One Summit, global security leaders will gather to explore three themes — Crisis, Conflict, and Continuity — as the American presidency shifts to a new commander in chief.

      As the war on terrorism rages on, senior officials will sit with national security journalists to discuss their views, goals, and predictions about a range of issues, from daily combat in Iraq to the grand-strategy games of the great powers, and the challenges of managing budgets, equipment, and people as they shift to a new administration.

      Join Defense One on Nov. 15 for a special Leadership Briefing to kickoff this year’s Defense One Summit. Adm. Harry Harris, Commander of the U.S. Pacific Command is sitting down with Kevin Baron, Defense One Executive Editor, for a one-on-one conversation covering the challenges and future of the Pacific Command. Click here to learn more and register for this event.

      Read more >
    • Getting Comfortable with Difficult Conversations
      Getting Comfortable with Difficult Conversations Bev Holden & Kate Hargreaves from The Clear Thinking Partnership Recorded: Oct 8 2015 10:00 am UTC 63 mins
    • “Teams that trust one another are not afraid to engage in passionate dialogue around issues and decisions that are key to the organisations success”
      - Patrick Lencioni
      Conflict is inevitable in the workplace and our instinctive reaction is that it’s bad for business, but this is not always true. Differences of opinion, alternative perspectives and passionate exchanges, harnessed in the right way, are essential elements of organisational business success.
      Our inner dialogue can be relied on to tell us when we need to have a difficult conversation with someone—the kind of conversation that, if it took place, would improve life at work for ourselves or for people in our team. This sensible advice is often drowned out by our fear – fear of getting it wrong, making it worse or looking a fool, and we put that conversation off, allowing that individual to continue to miss deadlines, engage in interpersonal conflicts, produce poor work or exhibit toxic behaviour.

      In this one hour webinar……
      •you’ll learn how to engage in and encourage positive conflict within your team and understand the benefits that this can bring
      •you’ll explore a powerful structure to guide you through any difficult conversation with grace and confidence
      •you’ll discover some simple and practical approaches for harnessing positive conflict and having difficult conversations that will have immediate implications for you in your work and life
      •we’ll answer some of your burning questions about getting comfortable with difficult conversations

      Read more >
    • Helpful hackers
      Helpful hackers Chris van 't Hof Recorded: Nov 25 2016 10:10 am UTC 38 mins
    • Hospital leaks patient records’, ‘Public transport smartcard has more holes than a sieve’, ‘Mobile banking app unsafe’ – it seems that everything can be hacked these days. Fortunately, the person who discovers a flaw is not necessarily a cybercriminal but is often someone who wants to help improve cyber security. He or she immediately contacts the system owner so that the problem can be solved. A well-coordinated approach allows everyone to learn from the exercise we call ‘responsible disclosure’.

      The Netherlands is a world leader in responsible disclosure. The Dutch like to resolve conflicts through a process of general consultation: the famous ‘polder model’. This seems a particularly appropriate approach in the realm of IT and cyber security, since there is no central authority with overall responsibility but many diverse players, each responsible for their own tiny part of a vast and complex system.

      For the last four years, researcher Chris van ’t Hof has been collecting stories from the hackers, system owners, IT specialists, managers, journalists, politicians and lawyers who have been key players in a number of prominent disclosures. His book “Helpful Hackers.” (2016) offers a glimpse into the mysterious world of cyber security, revealing how hackers can help us all.

      Read more >
    • Why Vendor Liability is Necessary to Secure Consumer IoT
      Why Vendor Liability is Necessary to Secure Consumer IoT Tatu Ylonen, Founder & SSH Fellow, SSH Communications Security, Inc. Upcoming: Jun 21 2017 10:00 am UTC 60 mins
    • We live in an IoT world. Connected devices now include TVs, refrigerators, security systems, phones, music players, smart assistants, DSL modems, cars, and even toothbrushes. Besides privacy and personal security concerns, these devices pose significant risk of cyber attacks. IoT devices have been used in devastating DDoS attacks that have paralyzed key Internet services, emergency services, and heating systems. In addition to run-of-the-mill hackers and hacktivists, they are the first line of attack in any low-to-medium scale cyber conflict between nation states.

      Vulnerable IoT devices represent a direct threat to safety, life, property, business continuity, and general stability of the society.

      This talk will discuss the security challenges surrounding IoT devices, and what is needed for a balanced framework that forces vendors to implement a reasonable level of best practice without causing them undue burden and risk.

      About the Presenter:
      Tatu Ylonen is a cybersecurity pioneer with over 20 years of experience from the field. He invented SSH (Secure Shell), which is the plumbing used to manage most networks, servers, and data centers and implement automation for cost-effective systems management and file transfers. He is has also written several IETF standards, was the principal author of NIST IR 7966, and holds over 30 US patents - including some on the most widely used technologies in reliable telecommunications networks.

      Read more >