Hi [[ session.user.profile.firstName ]]
Sort by:
    • People and Performance – Measuring the Impact of Human Capital People and Performance – Measuring the Impact of Human Capital Angela Baron, Advisor, Employment Relations, CIPD Recorded: May 14 2009 12:00 pm UTC 38 mins
    • What gets measured matters! Notoriously difficult to measure the human contribution has often been neglected in organizational decision making. The result is that important strategies are agreed with little or no knowledge of whether the capacity is there to deliver. For a number of years now the CIPD has been working in the area of human capital looking at how organisations generate and use meaningful data to inform stakeholders of the contribution of people to business. Different stakeholders need different information. Managers need to know how to manage people to ensure their efforts are directed on the right thinks and that they are encouraged to share and develop both their personal skills and organsiational knowledge, external stakeholders want to know how the organization is going to meet their needs whether it be for excellent service, return on investment or continuous innovation. This session will look at the issue of human capital and how we can gain greater understanding of the value and contribution of people to inform multiple stakeholders with a view to maximizing performance.

      Read more >
    • Transforming Human Capital Management & Training Transforming Human Capital Management & Training Office of Personnel Management Recorded: Mar 1 2016 3:00 pm UTC 61 mins
    • If more effective, less costly and less burdensome acquisition support for human capital and training initiatives will enhance your agency and program missions, you won’t want to miss this viewcast! Anne Rung, Administrator of OMB’s Office of Federal Procurement Policy and Joseph Kennedy, OPM’s Associate Director for HR Solutions will share emerging best practices for acquiring best-in-class, highest value acquisition support for human capital and training initiatives through Category Management.

      Rung and Kennedy will introduce you to Human Capital Category Management and tell you about its benefits during this one-hour viewcast event. Anyone with an interest in more effective, less costly and less burdensome acquisition support for human capital and training initiatives should plan to attend.

      Today, HC and training purchases and pricing are managed individually across thousands of procurement units. The new vision: Manage entire categories of purchases collaboratively, cohesively and in sync across agencies while maintaining mission focus. The result is a fundamental shift in how agencies can more efficiently reach their mission goals.
      Learn how OPM’s HR Solutions being named the federal government’s Category Manager for Human Capital and Training and its new, collaborative ventures with GSA will bolster your mission effectiveness and long-term workforce engagement at lower costs and levels of effort.

      They will share the basics of Category Management:

      •What it is and how it will alter the way you purchase human capital management and training products and services.
      •How Category Management will transform human capital management and training, so you can better meet your agency’s mission goals.
      •How the new Human Capital and Training Solutions (HCaTS) contract will change the acquisition landscape for those products and services.

      Read more >
    • Investigating human trafficking in supply chains Investigating human trafficking in supply chains Richard Dailly, Kroll Managing Director Recorded: Jan 27 2016 4:30 pm UTC 52 mins
    • Identifying social compliance issues, particularly forced labor and human trafficking in supply chains, continues to be a significant problem for business, particularly when sourcing from opaque and non-transparent emerging markets. Civil society is playing a large part in increasing awareness and pressuring politicians to introduce and enforce legislation, and is gradually highlighting the issue as a problem which needs to be addressed both by governments and the business community.

      Kroll has been researching and working on this issue for a number of years and believes that businesses should be taking the issue as seriously as other forms of compliance.

      Read more >
    • Addressing Human Rights and Ethical Issues in Asia Addressing Human Rights and Ethical Issues in Asia Richard Dailly & Ruici Tio – Kroll Singapore Recorded: Nov 5 2014 4:00 pm UTC 49 mins
    • Join Kroll experts for a webinar about Human Rights and Ethical Issues in Asia, the potential impact they have on your global supply chain, and how legislation, such as the California Transparency in Supply Chain Act, is affecting companies with vendors in Asia.

      Recent US and international legislation has led to greater scrutiny of global supply chains, requiring companies to disclose their efforts in combating human rights risks within their direct supply chain. While the boundaries for accountability within supply chains remain unclear, consumer and stakeholder expectations are pushing companies to prioritize and address issues such as human trafficking, conflict materials, poor working conditions, and land rights issues. This webinar will discuss how legislation is affecting companies with vendors in Asia and cross-sector solutions to meet the challenges of supply chain, particularly in the ASEAN context.

      Read more >
    • Technology Is Not Enough! Why Building a Human Defense is the Key to Fighting Technology Is Not Enough! Why Building a Human Defense is the Key to Fighting Martin Whitworth, Senior Analyst, Forrester Research | Rohyt Belani, Founder & CEO, PhishMe Upcoming: Jun 14 2016 2:00 pm UTC 60 mins
    • For too long the human element has been wildly underutilized in protecting valuable assets and defending against prolific cyber-attacks. Security awareness initiatives are often sporadic, employing uninspired materials that yield little to no results – ultimately rendering security technologies useless due to easily avoidable human mistakes. A continued focus on security awareness alone is a plan doomed to fail. Instead, by shifting our focus to conditioning workforce behaviors through immersive experiences, security best practices become ingrained in daily workflow, helping to not only recognize and report on attack attempts, but weaponizing human intelligence to assist security operations, incident response and security event management in eliminating phishing threats.

      Join guest speaker Martin Whitworth, security analyst at Forrester Research, and Rohyt Belani, CEO and co-founder of PhishMe, as they demonstrate how building the right defense programs and teams can effectively change security culture, evolving from awareness to sophisticated strategies that achieve real results. In this webinar, you’ll learn:

      •Why security awareness alone is failing the enterprise
      •How to unlock the power of human driven intelligence
      •Tips on speeding incident response

      Read more >
    • Activating the Human: Transforming your biggest risk into your biggest asset Activating the Human: Transforming your biggest risk into your biggest asset Aaron Higbee, CTO & Co-Founder, PhishMe + Scott Greaux, Vice President, Product Management, PhishMe Recorded: May 19 2016 4:00 pm UTC 62 mins
    • In 2015, phishing related breaches dominated security news headlines, and the trend continues into 2016 with a rise in ransomware incidents. Even with record spending on security technology solutions, phishing remains the greatest threat to organizations.

      As phishing success depends on human error, organizations need to better leverage their most important resources in the battle – their employees. The phrase “All it takes is one” no longer has a negative meaning when all employees are empowered as the last line of security defense after the malicious email passed through porous security systems in place. And, not only can employees be fortified to resist phishing attempts, they also hold the key to providing IT and Security teams with timely company-specific attack intelligence.

      In this webinar, PhishMe’s Aaron Higbee and Scott Greaux will discuss:

      · The success and failure of technology systems

      · How conditioning – not awareness – empowers employees to identify and report phishing attacks

      · How critical attack intelligence generated from employees can be used to detect attacks – in progress

      Read more >
    • Humans - the weakest link or your greatest asset? Humans - the weakest link or your greatest asset? Jeffrey Rogers, VP, Customer Success, PhishMe Recorded: Oct 27 2015 1:00 pm UTC 45 mins
    • 91% of breaches can be traced back to a phishing message that deceives a user into unleashing the attacker’s payload. Having infiltrated the network, it then takes an average 205 days for the threat group’s presence to be detected. For organisations to stand a chance of protecting their data assets, they need to get better at preventing threat actors from accessing their infrastructure and reduce the time it takes to identify their presence. But how?

      The reason phishing has such a high success rate is that it targets people. Can you turn than your weakest link into a human force field that protects the network and provides actionable intelligence?

      During this webinar, Jeffrey Rogers, VP of Customer Success at PhishMe, will reveal statistics about the phishing threat, detail how phishing has evolved, and explore how to engage users to develop better security habits and become human sensors.

      Read more >
    • Human Age – The Talent Mismatch Human Age – The Talent Mismatch Melanie Holmes - ManpowerGroup - Vice President, Community Investment Recorded: Feb 27 2013 5:00 pm UTC 58 mins
    • Join ManpowerGroup for a complimentary webinar designed to provide insight into the Human Age, Talent Shortage and what that means for hiring and your success in 2013.

      Businesses face an ongoing challenge of finding the right people with the right skills – those who can improve performance, strengthen competitive advantage and drive sustainable growth. In fact, ManpowerGroup's research continues to reveal that U.S. employers are struggling to fill mission-critical positions, despite continued high unemployment. The paradox between the difficult to fill open positions and the high number of individuals looking for work, has major ramifications on both employment and business success in the U.S.

      By participating in this webinar you will:

      •Learn about the Human Age and the forces of change that are transforming the world of work
      •Understand the factors causing the talent shortage – and how they impact your business
      •Identify specialized solutions for winning in today's intense race for skilled talent
      and edging out the competition
      •Get practical advice on how to develop and implement a winning
      workforce strategy

      Complimentary Continuing Education Credits: This program has been approved for 1 recertification credit hour toward PHR, SPHR and GPHR recertification through the Human Resource Certification Institute (HRCI). Please be sure to note the program ID number on your recertification application form. For more information about certification or recertification, please visit the HRCI homepage at www.hrci.org.

      Read more >
    • People Make the Best Exploits: How Threats Prey on the Human Factor People Make the Best Exploits: How Threats Prey on the Human Factor Patrick Wheeler Director,Threat Intelligence, Proofpoint Recorded: Mar 16 2016 10:15 pm UTC 59 mins
    • Cybersecurity vendors devote much of their attention to the technical aspects of their task: malware payloads, distribution methods, infection chains, stolen data, and so on. To be sure, these elements are important. But focusing on them too narrowly neglects a simple fact: in the end, people are the targets.

      That’s why attacks are still getting through, despite advances in detection and response technology. From email and web to social media and mobile apps, attackers are exploiting the human factor.

      Join Proofpoint Director of Threat Intelligence Patrick Wheeler as he discusses The Human Factor 2016 report.

      This Dark Reading webinar presents original field research from data gathered by Proofpoint products deployed in customer settings around the world. Patrick will cover threats in email attachments, social media posts, and URLs.

      In this webinar you will see not just who is clicking what—but when, where, and why they are clicking:

      Who is being targeted, and who is falling victim
      What attackers are sending, and which lures are working
      When threats arrive, and when people are most likely to click

      Read more >
    • Data loss due to human error - Stop the zombie apocalypse Data loss due to human error - Stop the zombie apocalypse David Lacey, leading researcher in Cybersecurity; Paul Castiglione, Secure File Transfer Advocate, Ipswitch Recorded: Mar 17 2016 3:00 pm UTC 54 mins
    • Implementing Compliance Controls for Data Protection in Regulated Industries

      Securing protected data and meeting data privacy compliance demands are top IT challenges, but recent survey results of over 500 IT pros globally show human and processing errors are the top reasons for data loss.

      The key is to stop zombie-like employee activity by protecting data in motion – including communication between service providers, government agencies, and customers, or integrating business systems across datacenters and the cloud.

      Join this session to understand the essential requirements, strategies and solutions for addressing data privacy laws and regulatory compliance while protecting your data in motion.
      The webinar will address key questions such as:

      • What are the top data protection concerns of your IT peers and how are their organization addressing them?
      • What are the essential IT control requirements protecting data in motion?
      • What are practical strategies to cost effectively meet requirements?
      • Which file transfer and sharing technologies help or hurt your data protection?

      We’ll also look at key trends, which are driving organizational demand for new approaches to technology:

      · Security has moved to a “de-perimeterized” model, where security is wrapped around data and applications to ensure protection.
      · Strong authentication and encryption are now a default expectation to safeguard sensitive data, both at rest and in transit, but what else is needed to ensure data protection and compliance?

      This session will be presented by David Lacey, a former CISO, founder of the Jericho Forum, and author of the original text that formed the basis of the ISO/IEC 27000 standards.

      Read more >