Hi [[ session.user.profile.firstName ]]
Sort by:
    • DOL's New Conflict of Interest Regs: Game Changer for Retirement Advisers
      DOL's New Conflict of Interest Regs: Game Changer for Retirement Advisers Brad Bondi, Michael Wheatley Recorded: Jul 14 2016 5:00 pm UTC 54 mins
    • In April 2016, the Department of Labor issued final regulations expanding the definition of “fiduciary” for advisers to retirement plans, including advisers to IRAs and ERISA plans. Some advisers and financial institutions who previously were not considered fiduciaries now will be required to meet a fiduciary standard of care and, unless an exemption applies, may not engage in so-called “prohibited transactions” that create potential conflicts of interest (e.g., receiving compensation from third parties in connection with a transaction involving an IRA or an ERISA plan).

      The DOL also created a key exemption known as the Best Interest Contract Exemption (“BIC Exemption”). In general, the BIC Exemption allows advisers to engage in otherwise “prohibited transactions” as long as certain criteria are met. The new regulations will be phased in over time. The new definition of “fiduciary” will apply on April 10, 2017. The entire regulatory package will apply on January 1, 2018.

      In this Webcast, Brad Bondi (a partner at Cahill Gordon & Reindel LLP who leads the securities enforcement and regulatory practices) and Michael Wheatley (an associate at Cahill) will address issues concerning the new regulations, its impact on the financial services industry, best practices for financial services firms and lawyers to prepare for this new regulatory scheme, and pitfalls to avoid.

      Read more >
    • Behind the Syrian Conflict's Digital Front Lines
      Behind the Syrian Conflict's Digital Front Lines Nart Villeneuve (FireEye), Daniel Regalado (FireEye), John Scott-Railton (The Citizen Lab) Recorded: Feb 19 2015 4:00 pm UTC 59 mins
    • FireEye recently released a new report “Behind the Syrian Conflict’s Digital Frontlines” that documents a well-executed hacking operation that successfully breached the Syrian opposition.

      Between at least November 2013 and January 2014, the hackers stole a cache of critical documents and Skype conversations revealing the Syrian opposition’s strategy, tactical battle plans, supply needs, and troves of personal information and chat sessions. This data belonged to the men fighting against Syrian President Bashar al-Assad’s forces as well as media activists, humanitarian aid workers, and others within the opposition located in Syria, the region and beyond.

      We have only limited indications about the origins of this threat activity. Our research revealed multiple references to Lebanon both in the course of examining the malware and in the avatar’s social media use. While we do not know who conducted this hacking operation, if this data was acquired by Assad’s forces or their allies it could confer a distinct battlefield advantage.

      Join us for a roundtable discussion with subject matter experts where we’ll talk about the details of the report and explore surrounding topics, to include:

      • An overview of the conflict in Syria and why cyber-espionage is an increasingly important factor
      • An in-depth analysis of a critical breach of the Syrian opposition including an overview of the tools and techniques used by the threat actors

      All webinar attendees will receive a free copy of the new Syrian report. Register today!

      Read more >
    • Be better at managing conflict under stress
      Be better at managing conflict under stress Dr. Ralph H. Kilmann Recorded: Jun 5 2013 2:30 pm UTC 60 mins
    • The co-author of the TKI assessment will provide a deep understanding of how the increasing levels of stress experienced in the workplace can not only prevent people from using the best conflict mode in a given situation (competing, collaborating, compromising, avoiding, or accommodating), but can also push people to react blindly to conflicts with fight, flight, or freeze.

      Join Dr Ralph Kilmann on 5 June to find out how you can help people maintain moderate stress (neither high nor low), enabling them to manage their conflicts mindfully and thus successfully.

      Read more >
    • Combining the TKI and MBTI® Assessment Tools
      Combining the TKI and MBTI® Assessment Tools Dr. Ralph Kilmann Recorded: Sep 19 2012 2:30 pm UTC 61 mins
    • For four decades, Dr. Ralph Kilmann has been using the MBTI and TKI tools to help organizations identify and then resolve their most troublesome problems.

      His approach starts by bringing recurring and unresolved differences between people out into the open, using four MBTI type groups (based on the functional pairs ST, NT, SF and NF). Once these differences have been identified, the TKI’s five conflict modes are used to develop an effective resolution for all concerned.

      In this one-hour webinar, Dr. Kilmann will describe how the combined TKI and MBTI assessments offer a powerful toolkit for solving complex problems and conflicts.

      Read more >
    • Can Business Process Management and Master Data Management work together?
      Can Business Process Management and Master Data Management work together? Featuring Guest Speaker Ramesh Dontha Recorded: May 5 2017 3:30 pm UTC 39 mins
    • Master Data Management (MDM) and Business Process Management (BPM) are two significant investments that enterprises usually undertake to realize tangible business benefits by streamlining business processes and leveraging data as an asset. Wouldn't it be great if both these programs can align on people (stakeholders), processes, and technologies so MDM-enabled processes become simpler? Yes, it is possible by focusing on Data Governance and stewardship for the benefit of MDM and BPM. This webinar will cover basic aspects of MDM and BPM, potential conflicts in implementing both, and identify possible solutions to align BPM and MDM. The webinar will also cover how data governance and stewardship can play a pivotal role in facilitating the implementation of BPM and MDM.

      Webinar Contents
      - Overview of Business Process Management (BPM)
      - Overview of Master Data Management (MDM)
      - Potential conflicts in BPM and MDM implementation with respect to
      people, processes, and technologies
      - Options for aligning BPM and MDM
      - Role of Data Governance in aligning BPM and MDM

      Read more >
    • Inherent Conflicts - U.S. Investigations & E.U. Data Privacy Laws
      Inherent Conflicts - U.S. Investigations & E.U. Data Privacy Laws FTI Consulting and Main Justice Recorded: May 5 2011 5:00 pm UTC 61 mins
    • From whistle blower allegations, government inquiries and subpoenas, to corporate due diligence, Foreign Corrupt Practices Act (“FCPA”) violations, and financial fraud – corporate counsel must collect and produce greater amounts of data from around the globe. Besides basic logistical issues, various tiers of data privacy restrictions complicate the process, requiring an in-depth knowledge of data storage technology and practices, multinational data transfer regulations, and general e-discovery best practices. For example, if data is required in response to a regulatory request in the United States, yet the custodians are based in France and Germany, how can the data be collected and reviewed in a defensible manner in compliance with EU as well as French and German data privacy laws? This program will outline the key considerations and best practices for collecting and assessing data in a defensible and secure manner.

      Read more >
    • From RAM to Reality
      From RAM to Reality Tom Finney and Matthew Webster, Counter Threat Unit security researchers at Dell SecureWorks Recorded: Mar 8 2016 2:00 pm UTC 56 mins
    • Observations of Geopolitical Conflicts Transitioning to Cyberattacks

      Geopolitical conflicts are more publicly transitioning into the cyber realm. With current conflicts, a cyber-component is almost always included – and the outcome can be observed in the physical world. What is the impact of these events? Can it expose trade secrets? Shut down financial markets? Or worse?

      During this interactive webinar, Tom Finney and Matthew Webster, Counter Threat Unit security researchers at Dell SecureWorks, will cover known events, discuss the actors behind them and generally talk about the potential impacts from these threats.

      In addition you will:

      - Understand the relationship between specific geopolitical events and cyberattacks
      - Learn about the actors behind these cyberattacks and the impact to your businesses
      - Get insight into the latest attack trends
      - Receive recommendations on security solutions and threat intelligence to help protect your network

      Read more >
    • From RAM to Reality
      From RAM to Reality Tom Finney and Matthew Webster, Counter Threat Unit security researchers at Dell SecureWorks Recorded: Mar 8 2016 7:00 pm UTC 55 mins
    • Observations of Geopolitical Conflicts Transitioning to Cyberattacks

      Geopolitical conflicts are more publicly transitioning into the cyber realm. With current conflicts, a cyber-component is almost always included – and the outcome can be observed in the physical world. What is the impact of these events? Can it expose trade secrets? Shut down financial markets? Or worse?

      During this interactive webinar, Tom Finney and Matthew Webster, Counter Threat UnitTM security researchers at Dell SecureWorks, will cover known events, discuss the actors behind them and generally talk about the potential impacts from these threats.

      In addition you will:

      - Understand the relationship between specific geopolitical events and cyberattacks
      - Learn about the actors behind these cyberattacks and the impact to your businesses
      - Get insight into the latest attack trends
      - Receive recommendations on security solutions and threat intelligence to help protect your network

      Read more >
    • Why Vendor Liability is Necessary to Secure Consumer IoT
      Why Vendor Liability is Necessary to Secure Consumer IoT Tatu Ylonen, Founder & SSH Fellow, SSH Communications Security, Inc. Upcoming: Jun 21 2017 10:00 am UTC 60 mins
    • We live in an IoT world. Connected devices now include TVs, refrigerators, security systems, phones, music players, smart assistants, DSL modems, cars, and even toothbrushes. Besides privacy and personal security concerns, these devices pose significant risk of cyber attacks. IoT devices have been used in devastating DDoS attacks that have paralyzed key Internet services, emergency services, and heating systems. In addition to run-of-the-mill hackers and hacktivists, they are the first line of attack in any low-to-medium scale cyber conflict between nation states.

      Vulnerable IoT devices represent a direct threat to safety, life, property, business continuity, and general stability of the society.

      This talk will discuss the security challenges surrounding IoT devices, and what is needed for a balanced framework that forces vendors to implement a reasonable level of best practice without causing them undue burden and risk.

      About the Presenter:
      Tatu Ylonen is a cybersecurity pioneer with over 20 years of experience from the field. He invented SSH (Secure Shell), which is the plumbing used to manage most networks, servers, and data centers and implement automation for cost-effective systems management and file transfers. He is has also written several IETF standards, was the principal author of NIST IR 7966, and holds over 30 US patents - including some on the most widely used technologies in reliable telecommunications networks.

      Read more >
    • Deep Learning on Apache® Spark™: Workflows and Best Practices
      Deep Learning on Apache® Spark™: Workflows and Best Practices Tim Hunter and Jules S. Damji Recorded: May 4 2017 5:00 pm UTC 47 mins
    • The combination of Deep Learning with Apache Spark has the potential for tremendous impact in many sectors of the industry. This webinar, based on the experience gained in assisting customers with the Databricks Virtual Analytics Platform, will present some best practices for building deep learning pipelines with Spark.

      Rather than comparing deep learning systems or specific optimizations, this webinar will focus on issues that are common to deep learning frameworks when running on a Spark cluster, including:

      * optimizing cluster setup;
      * configuring the cluster;
      * ingesting data; and
      * monitoring long-running jobs.

      We will demonstrate the techniques we cover using Google’s popular TensorFlow library. More specifically, we will cover typical issues users encounter when integrating deep learning libraries with Spark clusters.

      Clusters can be configured to avoid task conflicts on GPUs and to allow using multiple GPUs per worker. Setting up pipelines for efficient data ingest improves job throughput, and monitoring facilitates both the work of configuration and the stability of deep learning jobs.

      Read more >
    • Defense One Summit 2016
      Defense One Summit 2016 Defense One | Underwritten by: Marklogic Recorded: Nov 17 2016 1:15 pm UTC 129 mins
    • At the 4th Annual Defense One Summit, global security leaders will gather to explore three themes — Crisis, Conflict, and Continuity — as the American presidency shifts to a new commander in chief.

      As the war on terrorism rages on, senior officials will sit with national security journalists to discuss their views, goals, and predictions about a range of issues, from daily combat in Iraq to the grand-strategy games of the great powers, and the challenges of managing budgets, equipment, and people as they shift to a new administration.

      Join Defense One on Nov. 15 for a special Leadership Briefing to kickoff this year’s Defense One Summit. Adm. Harry Harris, Commander of the U.S. Pacific Command is sitting down with Kevin Baron, Defense One Executive Editor, for a one-on-one conversation covering the challenges and future of the Pacific Command. Click here to learn more and register for this event.

      Read more >
    • Defense One Summit 2016 - Afternoon Session
      Defense One Summit 2016 - Afternoon Session Defense One | Underwritten by: Marklogic Recorded: Nov 17 2016 5:45 pm UTC 243 mins
    • At the 4th Annual Defense One Summit, global security leaders will gather to explore three themes — Crisis, Conflict, and Continuity — as the American presidency shifts to a new commander in chief.

      As the war on terrorism rages on, senior officials will sit with national security journalists to discuss their views, goals, and predictions about a range of issues, from daily combat in Iraq to the grand-strategy games of the great powers, and the challenges of managing budgets, equipment, and people as they shift to a new administration.

      Join Defense One on Nov. 15 for a special Leadership Briefing to kickoff this year’s Defense One Summit. Adm. Harry Harris, Commander of the U.S. Pacific Command is sitting down with Kevin Baron, Defense One Executive Editor, for a one-on-one conversation covering the challenges and future of the Pacific Command. Click here to learn more and register for this event.

      Read more >