Hi [[ session.user.profile.firstName ]]
Sort by:
    • DOL's New Conflict of Interest Regs: Game Changer for Retirement Advisers
      DOL's New Conflict of Interest Regs: Game Changer for Retirement Advisers Brad Bondi, Michael Wheatley Recorded: Jul 14 2016 5:00 pm UTC 54 mins
    • In April 2016, the Department of Labor issued final regulations expanding the definition of “fiduciary” for advisers to retirement plans, including advisers to IRAs and ERISA plans. Some advisers and financial institutions who previously were not considered fiduciaries now will be required to meet a fiduciary standard of care and, unless an exemption applies, may not engage in so-called “prohibited transactions” that create potential conflicts of interest (e.g., receiving compensation from third parties in connection with a transaction involving an IRA or an ERISA plan).

      The DOL also created a key exemption known as the Best Interest Contract Exemption (“BIC Exemption”). In general, the BIC Exemption allows advisers to engage in otherwise “prohibited transactions” as long as certain criteria are met. The new regulations will be phased in over time. The new definition of “fiduciary” will apply on April 10, 2017. The entire regulatory package will apply on January 1, 2018.

      In this Webcast, Brad Bondi (a partner at Cahill Gordon & Reindel LLP who leads the securities enforcement and regulatory practices) and Michael Wheatley (an associate at Cahill) will address issues concerning the new regulations, its impact on the financial services industry, best practices for financial services firms and lawyers to prepare for this new regulatory scheme, and pitfalls to avoid.

      Read more >
    • In-depth Analysis Behind the Syrian Conflict's Digital Front Lines
      In-depth Analysis Behind the Syrian Conflict's Digital Front Lines Nart Villeneuve (FireEye), Daniel Regalado (FireEye), John Scott-Railton (The Citizen Lab) Recorded: Feb 25 2015 4:00 am UTC 60 mins
    • FireEye recently released a new report “Behind the Syrian Conflict’s Digital Frontlines” that documents a well-executed hacking operation that successfully breached the Syrian opposition.

      Between at least November 2013 and January 2014, the hackers stole a cache of critical documents and Skype conversations revealing the Syrian opposition’s strategy, tactical battle plans, supply needs, and troves of personal information and chat sessions. This data belonged to the men fighting against Syrian President Bashar al-Assad’s forces as well as media activists, humanitarian aid workers, and others within the opposition located in Syria, the region and beyond.

      We have only limited indications about the origins of this threat activity. Our research revealed multiple references to Lebanon both in the course of examining the malware and in the avatar’s social media use. While we do not know who conducted this hacking operation, if this data was acquired by Assad’s forces or their allies it could confer a distinct battlefield advantage.

      Join us for a roundtable discussion with subject matter experts where we’ll talk about the details of the report and explore surrounding topics, to include:

      • An overview of the conflict in Syria and why cyber-espionage is an increasingly important factor
      • An in-depth analysis of a critical breach of the Syrian opposition including an overview of the tools and techniques used by the threat actors

      Find out more and learn from this Syrian report how you can defend yourself against these cyber attackers

      Read more >
    • Behind the Syrian Conflict's Digital Front Lines
      Behind the Syrian Conflict's Digital Front Lines Nart Villeneuve (FireEye), Daniel Regalado (FireEye), John Scott-Railton (The Citizen Lab) Recorded: Feb 19 2015 4:00 pm UTC 59 mins
    • FireEye recently released a new report “Behind the Syrian Conflict’s Digital Frontlines” that documents a well-executed hacking operation that successfully breached the Syrian opposition.

      Between at least November 2013 and January 2014, the hackers stole a cache of critical documents and Skype conversations revealing the Syrian opposition’s strategy, tactical battle plans, supply needs, and troves of personal information and chat sessions. This data belonged to the men fighting against Syrian President Bashar al-Assad’s forces as well as media activists, humanitarian aid workers, and others within the opposition located in Syria, the region and beyond.

      We have only limited indications about the origins of this threat activity. Our research revealed multiple references to Lebanon both in the course of examining the malware and in the avatar’s social media use. While we do not know who conducted this hacking operation, if this data was acquired by Assad’s forces or their allies it could confer a distinct battlefield advantage.

      Join us for a roundtable discussion with subject matter experts where we’ll talk about the details of the report and explore surrounding topics, to include:

      • An overview of the conflict in Syria and why cyber-espionage is an increasingly important factor
      • An in-depth analysis of a critical breach of the Syrian opposition including an overview of the tools and techniques used by the threat actors

      All webinar attendees will receive a free copy of the new Syrian report. Register today!

      Read more >
    • The Difficult Client: Five Strategies for Resolving Challenges and Conflicts
      The Difficult Client: Five Strategies for Resolving Challenges and Conflicts Beverly Flaxington Recorded: Apr 13 2017 8:15 pm UTC 61 mins
    • How do you deal with those few “problem clients” who disagree with your investment approach, question your fees or demand too much of your time? In this presentation Bev will discuss five effective strategies for evaluating whether to “retain or release” a difficult client and how to create a more productive dynamic to address challenging relationships. You will learn how to:

      •Determine when it’s worth expending the energy to resolve client dissatisfaction;
      •Prepare thoroughly for a contentious client meeting;
      •"Depersonalize" emotional conflicts so you can focus on the facts;
      •Demonstrate empathy and validation even you disagree with clients’ statements; and
      •Use body language and other non-verbal cues to defuse tense situations.

      Bev will answer attendees’ questions during the session and will be available to continue the discussion on APViewpoint.

      Read more >
    • Defending from Attack: Winning the Cyber Conflict
      Defending from Attack: Winning the Cyber Conflict Griff James, Director, Damrod Analysis Ltd. Upcoming: Nov 14 2017 2:00 pm UTC 45 mins
    • Effective responses to modern IT risks requires a transition from cyber security to cyber defense. This presentation introduces analysis based on proven military tools to understand, assess, and defend against cyber-attack. See how Petya worked its way in, and how to defend against it. Take away valuable tools and frameworks to develop your defenses.

      Presenter:

      Griff is trained as a Canadian Infantry Officer and is a graduate of the Johnson-Shoyama Graduate School of Public Policy. After a two-year stint as a Strategic Policy Analyst at the Treasury Board Secretariat in Ottawa, he moved to London where he completed a Master’s Degree at the LSE. Unable to find “real” work, he got into software development as a Scrum Master, leading the development of a web based application. This experience fostered an interest in cybersecurity, and Griff went on to a boutique start-up providing application security to Fortune 500 companies. Frustrated by the disconnect between technologies and poor analysis within cyber security, Griff founded cyber defense firm Damrod Analysis in 2017. He is London based, where he and his wife are expecting their first child shortly.

      Read more >
    • Be better at managing conflict under stress
      Be better at managing conflict under stress Dr. Ralph H. Kilmann Recorded: Jun 5 2013 2:30 pm UTC 60 mins
    • The co-author of the TKI assessment will provide a deep understanding of how the increasing levels of stress experienced in the workplace can not only prevent people from using the best conflict mode in a given situation (competing, collaborating, compromising, avoiding, or accommodating), but can also push people to react blindly to conflicts with fight, flight, or freeze.

      Join Dr Ralph Kilmann on 5 June to find out how you can help people maintain moderate stress (neither high nor low), enabling them to manage their conflicts mindfully and thus successfully.

      Read more >
    • 3/3- Manipulação, conflitos, autoria e revistas
      3/3- Manipulação, conflitos, autoria e revistas Karin Hoch Fehlauer Ale Recorded: Sep 29 2017 6:30 pm UTC 79 mins
    • A última aula do curso será dedicada à falsificação e fabricação de dados, conflitos de interesse e ao reconhecimento de serviços de revisão em artigos publicados. Também discutiremos sobre atribuição de autoria e sobre as armadilhas que editoras e revistas predatórias utilizam para atrair autores.


      Minicurso "Seja um pesquisador responsável: publique com ética"

      O minicurso é composto por três aulas que abordarão o comportamento ético para a boa qualidade da pesquisa científica. A conduta antiética existe tanto dentro como fora do contexto do mundo acadêmico. Casos rotineiros de trapaça, fraudes e golpes são exemplos de comportamento antiético que têm consequências graves, passíveis de punição. Na Academia, a conduta antiética também pode ter desdobramentos sérios. O desenvolvimento de boas práticas em pesquisa ética ajuda os autores a publicarem seu trabalho de forma responsável e a evitarem assim rejeição e principalmente retração devido à má conduta. Além de acabar com uma trajetória profissional, a má conduta fere gravemente a integridade da Ciência. Neste curso, forneceremos orientação sobre quais são os preceitos éticos em publicação e como não cair em armadilhas durante o processo.
      This will be delivered in Portuguese

      Read more >
    • 3/3- Manipulação, conflitos, autoria e revistas
      3/3- Manipulação, conflitos, autoria e revistas Karin Hoch Fehlauer Ale Recorded: Jun 16 2017 6:30 pm UTC 87 mins
    • A última aula do curso será dedicada à falsificação e fabricação de dados, conflitos de interesse e ao reconhecimento de serviços de revisão em artigos publicados. Também discutiremos sobre atribuição de autoria e sobre as armadilhas que editoras e revistas predatórias utilizam para atrair autores.


      Minicurso "Seja um pesquisador responsável: publique com ética"

      O minicurso é composto por três aulas que abordarão o comportamento ético para a boa qualidade da pesquisa científica. A conduta antiética existe tanto dentro como fora do contexto do mundo acadêmico. Casos rotineiros de trapaça, fraudes e golpes são exemplos de comportamento antiético que têm consequências graves, passíveis de punição. Na Academia, a conduta antiética também pode ter desdobramentos sérios. O desenvolvimento de boas práticas em pesquisa ética ajuda os autores a publicarem seu trabalho de forma responsável e a evitarem assim rejeição e principalmente retração devido à má conduta. Além de acabar com uma trajetória profissional, a má conduta fere gravemente a integridade da Ciência. Neste curso, forneceremos orientação sobre quais são os preceitos éticos em publicação e como não cair em armadilhas durante o processo.

      This will be delivered in Portuguese

      Read more >
    • Combining the TKI and MBTI® Assessment Tools
      Combining the TKI and MBTI® Assessment Tools Dr. Ralph Kilmann Recorded: Sep 19 2012 2:30 pm UTC 61 mins
    • For four decades, Dr. Ralph Kilmann has been using the MBTI and TKI tools to help organizations identify and then resolve their most troublesome problems.

      His approach starts by bringing recurring and unresolved differences between people out into the open, using four MBTI type groups (based on the functional pairs ST, NT, SF and NF). Once these differences have been identified, the TKI’s five conflict modes are used to develop an effective resolution for all concerned.

      In this one-hour webinar, Dr. Kilmann will describe how the combined TKI and MBTI assessments offer a powerful toolkit for solving complex problems and conflicts.

      Read more >
    • Can Business Process Management and Master Data Management work together?
      Can Business Process Management and Master Data Management work together? Featuring Guest Speaker Ramesh Dontha Recorded: May 5 2017 3:30 pm UTC 39 mins
    • Master Data Management (MDM) and Business Process Management (BPM) are two significant investments that enterprises usually undertake to realize tangible business benefits by streamlining business processes and leveraging data as an asset. Wouldn't it be great if both these programs can align on people (stakeholders), processes, and technologies so MDM-enabled processes become simpler? Yes, it is possible by focusing on Data Governance and stewardship for the benefit of MDM and BPM. This webinar will cover basic aspects of MDM and BPM, potential conflicts in implementing both, and identify possible solutions to align BPM and MDM. The webinar will also cover how data governance and stewardship can play a pivotal role in facilitating the implementation of BPM and MDM.

      Webinar Contents
      - Overview of Business Process Management (BPM)
      - Overview of Master Data Management (MDM)
      - Potential conflicts in BPM and MDM implementation with respect to
      people, processes, and technologies
      - Options for aligning BPM and MDM
      - Role of Data Governance in aligning BPM and MDM

      Read more >
    • Bi-Directional Data Movement Need Not Be Feared
      Bi-Directional Data Movement Need Not Be Feared Glenn Goodrich Recorded: Oct 18 2017 11:10 pm UTC 14 mins
    • Bi-directional data movement need not be feared when using HVR for real-time data integration. In this video, Glenn Goodrich, Director of Enablement, explains how bi-directional data movement can be accomplished efficiently, accurately, and in real-time with HVR.

      Chapter 1: What is Bi-Directional? 1:13

      Chapter 2-1: How to Implement Bi-Directional 3:32

      Chapter 2-2: Bi-Directional Considerations 5:03

      Chapter 3: Why Implement Bi-Directional? 11:46


      Additional Areas of Interest:
      Collisions: 5:36
      Triggers: 6:34
      DDL Operations and Truncates: 7:15
      Loop Avoidance: 8:15
      Conflict Detection Resolution (CDR): 10:06

      Read more >
    • Managing a Global Team: Resolving Cross-Cultural Issues
      Managing a Global Team: Resolving Cross-Cultural Issues Barry Saiff, Saiff Solutions Recorded: Sep 7 2017 5:00 pm UTC 50 mins
    • More and more organizations are taking advantage of the benefits a globally-distributed workforce can provide. Although dispersed teams promise substantial growth opportunities and a reduction in overhead costs, managing them can be problematic. The secret to success is in understanding the differences you’re likely to encounter when managing teams across borders, cultures, and time zones.

      Join me, Scott Abel, The Content Wrangler, and my special guest, Barry Saiff, CEO of Saiff Solutions, for a free one-hour webinar on resolving the most common cross-cultural team management challenges.

      In this session, using real-life examples, you’ll learn how to address global cultural differences in the way people deal with conflict, relate to authority, ask and answer questions, express respect, and practice equality in the workplace. You’ll hear useful advice—gathered from our own experience managing a global team that spans North America, Asia, and Europe. You’ll leave knowing what you need to do to succeed.

      Read more >
    • Building Diverse Teams for Content Success
      Building Diverse Teams for Content Success Andrew Lawless, Team Lawless Recorded: Oct 17 2017 3:00 pm UTC 53 mins
    • Making content teams work together is a struggle. On the one hand, creating engaging and sharable content requires a diverse team of professionals—from copywriters, editors, and subject matter experts to content engineers, user experience designers, and content marketers. On the other hand, we are pitting people who need data and a benchmark to make decisions against those that plan and execute without that information. Some look for short-cuts to formal processes, while others desire and follow complex workflows and plans. Some are visionary while others are only worried about the here and now.

      Join me, Scott Abel, The Content Wrangler, and my special guest, Andrew Lawless, for a free, one-hour webinar focused on helping content teams collaborate better regardless of their differences. You'll learn about a methodology that has been successfully used to coach hundreds of thousands of employees—from Fortune 500 companies to smaller family-owned businesses. You leave with a fresh understanding of human behavior, and you'll learn the real reasons people act the way they do. You'll learn how to ease conflict, strain, and tension in team relationships and you discover how to provide information to people in a way that they can best absorb it.

      Read more >
    • Preparing for the Fiduciary Battle: How Advisors Can Get an Unfair Advantage
      Preparing for the Fiduciary Battle: How Advisors Can Get an Unfair Advantage Knut Rostad Recorded: Apr 20 2017 8:15 pm UTC 61 mins
    • Implementation of the DOL rule may be delayed or abandoned, but the next battle over the fiduciary standard is just beginning. In this webinar, Knut will offer strategies advisors can use to prepare for victory in this increasingly complex and polarized battleground. He will discuss:

      •The historical forces shaping today’s fiduciary conflicts, from the rise of ERISA in the Nixon era to the enactment of Dodd-Frank in the wake of the Great Recession of 2008-2009;
      •Lessons learned from the rise and fall of 2015-2017 DOL fiduciary initiative;
      •How advisors can prepare to gain the high ground in the next fiduciary battle; and
      •Specific strategies and practices advisors can use to capture the hearts, minds and assets of disgruntled and skeptical investors

      Knut will answer attendees’ questions during the session and will be available to continue the discussion on APViewpoint.

      Read more >
    • Why Vendor Liability is Necessary to Secure Consumer IoT
      Why Vendor Liability is Necessary to Secure Consumer IoT Tatu Ylonen, Founder & SSH Fellow, SSH Communications Security, Inc. Recorded: Jun 21 2017 10:00 am UTC 55 mins
    • We live in an IoT world. Connected devices now include TVs, refrigerators, security systems, phones, music players, smart assistants, DSL modems, cars, and even toothbrushes. Besides privacy and personal security concerns, these devices pose significant risk of cyber attacks. IoT devices have been used in devastating DDoS attacks that have paralyzed key Internet services, emergency services, and heating systems. In addition to run-of-the-mill hackers and hacktivists, they are the first line of attack in any low-to-medium scale cyber conflict between nation states.

      Vulnerable IoT devices represent a direct threat to safety, life, property, business continuity, and general stability of the society.

      This talk will discuss the security challenges surrounding IoT devices, and what is needed for a balanced framework that forces vendors to implement a reasonable level of best practice without causing them undue burden and risk.

      About the Presenter:
      Tatu Ylonen is a cybersecurity pioneer with over 20 years of experience from the field. He invented SSH (Secure Shell), which is the plumbing used to manage most networks, servers, and data centers and implement automation for cost-effective systems management and file transfers. He is has also written several IETF standards, was the principal author of NIST IR 7966, and holds over 30 US patents - including some on the most widely used technologies in reliable telecommunications networks.

      Read more >