Mobile device are now ubiquities in enterprise from large multi-nationals to the smallest niche players. The evolution of security of these devices has evolved from setting a PIN and encrypting the devise to complex Mobile Device Management (|MDM) solutions offering a plethora of security controls.
The question is do the currently available security controls provide enterprises with the controls that actually need and want? Mobile device security is still in its infancy and this talk will examine what the future of mobile security might look like.
More than one-third of all cybercrime incidents and security breaches are caused by insiders. Insiders have many motivations, including financial, political or emotional. But no matter the reason, insiders inappropriately access an organisation’s critical value data.
Join Keith Lowry, Senior Vice President of the Business Threat Intelligence and Analysis Team at Nuix and Stan Gallo, Director and National Leader of Forensic Technology at KPMG, as they cover:
- The definition of an insider threat
- What organisations are doing wrong in their approach to managing insider threats
- How to design and implement an insider threat program.
Insurance start-ups have seen large funding and lots of eyes looking at them to be the next to experience a Fintech-like boom.
Join this session where the panel of experts from varied backgrounds will discuss the following:
-Trends in InsurTech
-Why the traditional insurance market was prime for disruption
-How does InsurTech ensure a “customer first” strategy
-How does InsurTech promote more flexibility and self-service
Employees going through the transition to parenthood can be lost from the most demanding roles in the workforce and/or from the talent pipeline, unless we pay attention to this area.
Coaching that acknowledges the challenges of new parenthood, and focuses on communicating, prioritising, being influential and proactive at work can make the difference between employees returning long term, or leaving again. And equipping line managers for effective, timely communication as well as tips on avoiding pitfalls makes a huge difference.
In this webinar we examine the business case and hear first-hand from employers who are reaping the benefits.
As a means of helping ease the burden of pension liabilities, de-risking transactions remain high on the agendas of corporate sponsors and trustees.
When considering de-risking, principal focus is often justifiably spent on identifying the correct solution for the best price. However, other factors also deserve similar focus – transactions such as pension buy-ins or the use of longevity swaps often involve considerable complexity, with the resulting collateral structures persisting long after deal completion.
We invite you to join this webinar, in which we will explore these issues further. After assessing current trends in de-risking, we will focus on how three specific types of transaction – the collateralised buy-in, the use of longevity reinsurance or swaps, and the trapped surplus vehicle – can be supported.
Though this session, we aim to equip pension managers, trustees and corporate sponsors with a further understanding of the timeframes involved in these transactions – and share experiences of how deals have been successfully executed.
A slew of recent high profile data breaches among well-known companies has drawn attention to the critical role that corporate directors play in cyber security. Boards are increasingly involved in assessing the risk, improving the security profile of the companies they advise and managing the often highly publicised consequences of a breach.
But as directors are quickly learning, there’s no one size fits all answer for dealing with serious data breaches. Every incident is unique…
However, there are important steps boards can – and should – take to prepare for and respond effectively to cyber attacks.
Many NHS Trusts face a growing financial gap over the next 3 years. With £20 billion of efficiency savings yet to be achieved, more strategic estate plans need to be implemented without any compromise to the quality of services delivered.
Better estate management offers a realistic and achievable route to cost-savings.
To assist the NHS finance community in understanding how FM and estate transformation projects can successfully be implemented to support cost-savings initiatives this webinar will provide a detailed overview of 4 different types of major FM / estates projects that have recently concluded. Four example projects will be explained, including:
• The Leicestershire major FM outsourcing project with Interserve
• An innovative cost-saving estate management partnership between an NHS Trust and Capita
• LABV estate transformation projects using local asset backed joint ventures and
• Energy saving managed service projects.
Lee Clarke, Associate at DAC Beachcroft LLP and Marcus Palmer, KPMG will explain how each model has advantages and traps for the unwary but can, if procured carefully, provide real cost-savings for NHS organisations. Co-presented by Marcus Palmer, KPMG and Chaired by Andy Ray, Deputy Director of Finance, Basildon and Thurrock University Hospitals NHS Foundation Trust.
Aimed at Directors of Finance and their board colleagues, senior finance staff, along with their estates and facilities colleagues.
Thomas Hall says Dell Services is executing on its strategy and is proactive with customers in developing digital business solutionsRead more >
Ross Belhomme and Peter Grant will present a 45 minute webinar on the Foreign Account Tax Compliance Act (FATCA) and its impact on global exchange of information regimes, including the development of the Common Reporting Standard (CRS) by the OECD. Ross and Peter will discuss how clients and advisers have adapted to the new landscape and what they can expect to see in future from the increasingly complex reporting requirements.Read more >
John Timpany and Roy Saunders will be presenting a 45 minute webinar comparing the limitation of benefit provisions of various double tax treaties. Find out which treaties contain remittance and limitation of benefit clauses, permanent establishment exemptions and how an absence of participation exemptions in the US are driving the trend for corporate inversions.Read more >
In Dec 2010, Alastair McLellan interviewed Andrew Hine on the key issues facing the NHS for 2011. Watch this video interview now to hear his thoughts.Read more >
This presentation will take a look at the current state of the payment industry and provide experienced-based insight into why this industry continues to become a victim of data breaches. We’ll discuss short comings associated with the current controls employees by many merchants and payment processors and what new tactics can be applied to provide attack mitigations.Read more >
Topic title – VAT reforms in China – how do the recent and proposed changes impact on multinational companies
“The first phase of the VAT pilot program was implemented nationwide in mainland China on 1 August 2013. In this web seminar, we take a look at the key impacts for multinational companies doing business in, or with China. We also look at the future phases of the VAT pilot program and what it will mean for businesses in key sectors including financial services, insurance, real estate and construction. We will examine the impact the transition to VAT will have on pricing, overall indirect tax liabilities, changes to contracts, invoicing and IT systems and processes.”
ESG recently conducted research around insider threats, privileged users and APTs. While the security community remains fixated on advanced malware, tried-and-true insider threats are becoming more difficult to detect and prevent.
Register for "Privileged Users: Functional. Not Fraudulent" to learn why many organisation are vulnerable to these type of threats in spite of their existing cyber security. Key takeaways will include:
· Key trends around Insider Threats
· Major gaps between existing security processes and available technologies
· Critical components that help to reduce the attack surface
Join us for this must attend webcast to learn how privileged users can get their jobs done - without viewing or compromising data.