Hi [[ session.user.profile.firstName ]]
Sort by:
    • Internal Bug Hunts: Squashing Security Bugs on a Budget
      Internal Bug Hunts: Squashing Security Bugs on a Budget Pieter Ockers - Sr Program Manager at Adobe Recorded: Sep 19 2017 5:00 pm UTC 47 mins
    • Far too often, testing software for security flaws falls into the “nice-to-have” category, taking a backseat to the demands of the marketplace and inflexible feature release schedules. In addition to the expense of hiring an outside security testing team, testing for and fixing obscure security bugs is a brake on an engineer’s ability to put new code in the hands of their customers. Fortunately, there is a workaround to this dilemma that will allow you to promote application security awareness while helping to reduce security bugs in your applications.

      An internal bug hunt contest - in which your employees compete for prizes by finding and reporting security bugs - enables you to harness the creativity and problem-solving skills of your workforce while reducing security bugs in your applications. It can also help promote a culture of security awareness - without a large security testing budget.

      An internal bug hunt contest can you help you:

      • Find and remediate vulnerabilities before external entities can exploit them
      • Provide a safe platform for your application owners to test for security bugs
      • Promote application security awareness
      • Engage employees outside of the central security team who want to explore the security domain

      In this webcast, you will learn how an internal bug bounty program can help you find security flaws in your applications before criminals or spies, while improving the security culture at your company.

      Read more >
    • Internal Audit and Third Party Risk
      Internal Audit and Third Party Risk Tim Leitz, Regional Practice Leader for Risk Advisory Services, Experis Finance Recorded: Nov 16 2016 5:00 pm UTC 63 mins
    • Regulators acknowledge the risks associated with vendor relationships and have demanded that business leaders monitor and take responsibility for the actions of their vendors through various laws and standards such as the Sarbanes-Oxley Act, the Gramm-Leach-Bliley Act, the FCPA, the Health Insurance Portability and Accountability Act, as well as the Payment Card Industry Data Security Standard (PCI DSS) requirements and CFPB guidance.

      Consequently, vendor management is currently at the forefront of organizational risk management priorities and Internal Audit needs to address vendor management and third party risk in their audit planning and execution.

      In this presentation, you will:
      - Gain an understanding of the potential risks that may arise from the use of third party service providers
      - Identify the basic elements of an effective third party risk management program

      Read more >
    • Ethical Leadership: How Internal Audit Can Influence the Tone at the Top
      Ethical Leadership: How Internal Audit Can Influence the Tone at the Top Don Levonius Recorded: Nov 18 2014 4:30 pm UTC 120 mins
    • According to IIA guidance, internal auditors are charged with monitoring organizational ethics and assessing whether management policies, procedures, and practices support ethical operations. And while management usually seeks to set, promote, and perpetuate an ethical climate, some leaders seem either motivated by self-interest or so focused on other operational priorities that they overlook their obligation to steward organizational ethics.

      What can internal audit do to articulate this risk of unethical behavior? How can internal audit influence the tone at the top? How can internal auditors persuade management to see the value proposition for ethical leadership? This webinar addresses these questions and equips auditors, audit directors, and CAEs to make a compelling argument as to how ethical leadership drives bottom-line results.

      By the end of this webinar, participants should be able to:

      -Compare contrasting views of behavioral ethics
      -Differentiate between moral and conditioned honesty
      -Examine rationalizations commonly indicative of moral disengagement
      -Explain why ethical stewardship is a primary leadership responsibility
      -Correlate ethical leadership to organizational results
      -Formulate a compelling argument in favor of an ethical tone at the top

      Read more >
    • Internal Audit at a Breaking Point: How to Manage the Growing Array of Audits
      Internal Audit at a Breaking Point: How to Manage the Growing Array of Audits GRC Analyst Michael Rasmussen, GRC 20/20 accompanied by Nick Rafferty, COO, SureCloud Recorded: Dec 15 2015 2:00 pm UTC 47 mins
    • Internal audit is in a constant state of transformation. Audit departments are being asked to do more audits, provide assurance on business operations and risk management, evaluate compliance, and advise the organisation with limited audit resources.

      They are challenged with a growing array of audits that go beyond financial audits to provide assurance through IT audits, operational audits, quality assurance audits, third party audits, and more. This demands that Audit have processes supported by an information and technology architecture that drives efficiency, effectiveness, and agility in audit processes and tasks.


      This webinar details how organisations need to take an agile approach to internal audit management that allows for a growing array of audits on an agile information and technology architecture to support internal audit management activities and reporting.

      This ‘Expert’ presentation will address the following:

      • Where and how internal audit is strained
      • How to integrate a risk-based approach to audits as well as a cyclical audit plan
      • The value of an information and technology audit management architecture
      • Best practices in internal audit management

      Read more >
    • Gartner on demand Webcast: The Growing Need for Internal Segmentation Firewall
      Gartner on demand Webcast: The Growing Need for Internal Segmentation Firewall Lawrence Pingree, Research Director, Gartner & Warren Wu, Fortinet Recorded: May 10 2016 12:05 pm UTC 40 mins
    • Cloud applications and BYOD have brought new functionality to enterprise networks - and unfortunately, also new security weaknesses and opportunities for cyber espionage. The addition of an Internal Segmentation Firewall (ISFW) offers strategic protections within the network that can bolster existing defenses and limit potential exposures.

      This webcast – “Strong on the Inside: The Growing Need for Internal Segmentation Firewalls” – features leading experts from Gartner and Fortinet as they discuss the latest in internal network security for today’s threat landscape, including:

      •Why targeted attacks worldwide are becoming more pervasive, and how a single malicious breach can cripple a company
      •How ISFWs differ from traditional firewalls - and why they can uniquely reduce the attack surface, contain internal threats, and minimize damages after a breach occurs
      •Why multi-gigabit performance is critical to an ISFW’s ability to provide deep visibility without slowing down the network

      Read more >
    • STRONG ON THE INSIDE: The Growing Need for Internal Segmentation Firewalls
      STRONG ON THE INSIDE: The Growing Need for Internal Segmentation Firewalls Fortinet and Gartner Recorded: Mar 21 2016 8:40 pm UTC 220 mins
    • Cloud applications and BYOD have brought new functionality to enterprise networks—and unfortunately, also new security weaknesses and opportunities for cyber espionage. Theft of intellectual property and proprietary data now amounts to billions of dollars in losses each year.

      Register now for this webcast with lead analyst firm Gartner that explores how Internal Segmentation Firewalls (ISFW) close a major security gap for businesses of all sizes.

      Learn about the growing pervasiveness of targeted attacks worldwide, with current data that shows how a single malicious breach can cripple a company

      Understand how ISFWs differ from traditional firewalls—and why they can uniquely reduce the attack surface, contain internal threats, and minimize damages after a breach occurs

      Find out why multi-gigabit performance is critical to an ISFW’s ability to provide deep visibility without slowing down the network

      Don’t miss the “Strong on the Inside: The Growing Need for Internal Segmentation Firewalls” webcast, featuring leading experts from Gartner and Fortinet as they discuss the latest in internal network security for today’s threat landscape.

      http://glowpoint.com/wp-content/uploads/2015/02/gartner-logo.png

      Read more >
    • Kickstart Internal Audit in 2014
      Kickstart Internal Audit in 2014 Brian Christensen, David Brand and Keith Keller, Protiviti Recorded: Jan 9 2014 6:00 pm UTC 88 mins
    • Internal auditors play a vital role in their organization’s strategies and daily activities. Your department’s audit plan should be a well-balanced examination that covers regulatory requirements and aligns key risk areas within the organization. However, in today’s fast changing environment, plans change and the needs of the organization may evolve rapidly. Has your support of the organization kept pace with those changes? Should you make changes to your audit plan to ensure coverage of new risks? Also, do you know what new elements should be included in your 2014 plan?

      The objective of this presentation is to help internal audit professionals identify emerging trends in need of attention so that auditors can better execute the department’s strategic focus on risk.

      Read more >
    • IIA-Australia/Protiviti 2013 Internal Audit Benchmarking Survey
      IIA-Australia/Protiviti 2013 Internal Audit Benchmarking Survey Mark Harrison,Managing Director, Protiviti Canberra & Rob McKimm, Group Assurance Manager, Origin Energy Recorded: May 29 2013 1:00 am UTC 60 mins
    • For the past four years, the Institute of Internal Auditors - Australia and Protiviti have conducted comprehensive surveys of Chief Audit Executives from over 160 organisations across all sectors, to capture trends and developments in the internal audit profession.

      Now in its fifth year, the 2013 edition surveyed Chief Audit Executives (CAEs) from organisations across the listed, unlisted, government and not for profit sectors. In 2012, we conducted qualitative research with Audit Committee members (Achieving High Performance in Internal Audit, Fourth Edition, 2012). Several major themes were raised and were included as questions in the current survey to CAEs. Mark Harrison, Managing Director, Protiviti Canberra and Rob McKimm, Group Assurance Manager, Origin Energy will present the results of the survey which include reflecting on the major themes from 2012. They will compare year on year results and highlight trends that may be relevant to you and your organisation.

      Read more >
    • Stable Isotope-Labeled Protein Internal Standards
      Stable Isotope-Labeled Protein Internal Standards James Walters, Ph.D. Recorded: Sep 21 2017 7:15 pm UTC 62 mins
    • Mass spectrometry-based protein assays impart increased specificity and more rapid development times versus traditional methods, such as ELISA. Coupled with immunoaffinity enrichment, LC-MS/MS is becoming a powerful tool for the quantitation of proteins in plasma. Such methods typically rely on synthetic stable isotope labeled (SIL) peptide internal standards to correct for instrumental variability. For more accurate protein quantitation by LC-MS/MS, experimental variations throughout the entire sample preparation workflow, including protein fractionation, immunoaffinity enrichment, and enzymatic digestion, must be accounted for. An ideal way of improving assay reproducibility is to add a full-length stable isotope labeled recombinant protein, that is equivalent to the native target protein, to the sample at the initial stage of the assay workflow. We have developed a set of stable-isotope-labeled monoclonal antibodies expressed in CHO cells as well as SIL versions of several clinically-relevant human proteins expressed in E. coli, such as IGF1, and in mammalian HEK293 cells, such as Thyroglobulin (manufactured as a Certified Reference Material). We will present data to demonstrate that the use of full-length SIL proteins and antibodies as internal standards allows for more accurate and rapid quantitation of biotherapeutic antibodies and clinically-relevant human protein biomarkers in plasma by LC-MS/MS.

      Read more >
    • Stable Isotope-Labeled Protein Internal Standards
      Stable Isotope-Labeled Protein Internal Standards James Walters, Ph.D. Recorded: Sep 20 2017 3:00 pm UTC 56 mins
    • Mass spectrometry-based protein assays impart increased specificity and more rapid development times versus traditional methods, such as ELISA. Coupled with immunoaffinity enrichment, LC-MS/MS is becoming a powerful tool for the quantitation of proteins in plasma. Such methods typically rely on synthetic stable isotope labeled (SIL) peptide internal standards to correct for instrumental variability. For more accurate protein quantitation by LC-MS/MS, experimental variations throughout the entire sample preparation workflow, including protein fractionation, immunoaffinity enrichment, and enzymatic digestion, must be accounted for. An ideal way of improving assay reproducibility is to add a full-length stable isotope labeled recombinant protein, that is equivalent to the native target protein, to the sample at the initial stage of the assay workflow. We have developed a set of stable-isotope-labeled monoclonal antibodies expressed in CHO cells as well as SIL versions of several clinically-relevant human proteins expressed in E. coli, such as IGF1, and in mammalian HEK293 cells, such as Thyroglobulin (manufactured as a Certified Reference Material). We will present data to demonstrate that the use of full-length SIL proteins and antibodies as internal standards allows for more accurate and rapid quantitation of biotherapeutic antibodies and clinically-relevant human protein biomarkers in plasma by LC-MS/MS.

      Read more >
    • The API Economy in Banking Part 1, Preparing internal environments for PSD2
      The API Economy in Banking Part 1, Preparing internal environments for PSD2 David Harvey, Senior Principal Banking Practice, NTT DATA Services, Richard Price Sales Director, FSI UK & Ireland, TIBCO Upcoming: Dec 4 2017 2:00 pm UTC 60 mins
    • Regulatory conditions are preventing many banks from consolidating in the market, and there is evidence to support those financial institutions will need to re-engineer their own businesses and internal environments, transform current models to remain relevant, nurture and grow their customer bases.
      As part of this process, preparing internal IT environments and developing differentiating capabilities will be key in highly competitive markets and innovation before the adoption of the new ‘Fintech ecosystems’ or “fintegration” (i.e. the marrying up of banks and Fintechs) will be pivotal in the banking industry’s fight to maintain their current business and grow. Join David Harvey, Senior Principal, Banking Practice, NTT Data Services, and guest speaker Richard Price, Sales Director – FSI UK & Ireland, TIBCO.
      You will learn:
      - Trends, Implications, Challenges and Proposed Solutions
      - Internal preparation of your IT Environment for the new Digital banking Economy
      - Approaches on how to better prepare for new technologies through Open APIs
      - How to set up infrastructure and workflows to align Data Governance and Security in preparation for Open Banking.

      Read more >
    • The Seven Secrets of Building Strong Internal Brands
      The Seven Secrets of Building Strong Internal Brands Lucian Camp, Neil Dawson, Annabel Venner, Piers Pollock Recorded: Feb 6 2014 9:30 am UTC 90 mins
    • Organisations large and small can struggle with internal communications.

      In this webinar, experienced brand managers talk about what works and what doesn't in the crucial area of internal brand development.

      In people businesses, which almost all financial services businesses are, brands are built from within. Without strong internal buy-in, the chances of success in the external marketplace are negligible. Yet the fact is that most internal brand-building initiatives achieve little - and many are actually counter-productive, leading to an increase in off-brand behaviour.

      Speakers include:
      Lucian Camp, Principal, Lucian Camp Consulting (Chair)
      Annabel Venner, Global Brand Director, Hiscox
      Neil Dawson, Chief Strategy Officer, Europe, Sapient Nitro
      Piers Pollock, Executive Director of Strategy and Planning, The Gate London

      Read more >
    • Internal Audit: Managing Tax Risk
      Internal Audit: Managing Tax Risk Michael Baron, Director, Experis, & Paul Sassano, VP & National Practice Leader, Experis Recorded: Sep 26 2013 3:00 pm UTC 57 mins
    • Tax risk extends well beyond the financial statement impact. In today’s complex business environment, organizations must take a closer look at their tax risks to ensure there’s a solid framework in place to identify, measure and control risk and opportunities consistently and cost effectively.

      Join us to learn ways to improve the audit of tax risks in your organization. This session will be led by two members of the Experis leadership team who have extensive experience in corporate taxation and internal audit.

      During this one-hour webinar, our experts will:
      • Explain how to identify and assess potential tax risks faced by many corporations.
      • Discuss strategies to ensure effective risk oversight.
      • Outline solutions internal audit departments can employ to better manage tax risk.

      Read more >
    • The Role of Internal Network Traffic Analysis in Cybersecurity
      The Role of Internal Network Traffic Analysis in Cybersecurity Rob Westervelt, Research Manager, IDC Security + Arabella Hallawell, Sr. Director ADVT Product Marketing, Arbor Networks Recorded: Dec 8 2016 5:00 pm UTC 61 mins
    • This joint webinar between IDC and Arbor Networks will discuss how the threat landscape is rapidly evolving with financially motivated attackers, nation-states, and hacktivists out to disrupt business operations, steal data, or conduct corporate or cyberespionage.

      IDC analyst Rob Westervelt will examine an emerging category of solutions called Internal Network Traffic Analysis, which provide innovative approaches to attack detection and prevention. A comprehensive approach for data protection has network monitoring and traffic inspection at its core. Network traffic analysis is an essential element of most threat prevention and data protection strategies. He will explore why these solutions are a requirement and describes the most critical components necessary to identify and contain attacker movement before critical network resources and servers containing sensitive data are exposed.

      Arbor’s Arabella Hallawell, herself a former industry analyst with Gartner, will discuss the role of Arbor Networks solutions in addressing the challenges described above.

      Read more >