Hi [[ session.user.profile.firstName ]]
Sort by:
    • Making the Most of Your Season Review with Wendy Walker Making the Most of Your Season Review with Wendy Walker Wendy Walker Recorded: May 4 2016 3:00 pm UTC 24 mins
    • Most of the main tax season deadlines have come and gone. It’s now time to collect your notes and start preparing your review to internal stakeholders. How do you compile this information and present this data in a clear manner that will help drive process improvements for next year?

      Sovos is presenting a complimentary webinar that addresses these concerns that will be hosted by Wendy Walker who has over 15 years of reporting and compliance experience, including organizations like Zions Bancorporation and Chase.

      Why are season reviews so powerful?

      1. Creates alignment and more efficient communication with all the people, departments, and vendors involved with year-end processing.

      2. Improves the overall process by bringing visibility to the impact tax reporting processes can have when they go well and when they don’t.

      3. Creates better risk management (with penalties increasing twice this year) by facilitating valuable discussions and feedback needed to improve the accuracy of data, meet state and federal deadlines, and identify shortfalls and limitations of current systems and processes.

      This webinar will discuss six ways to help your review make a difference.

      •Document the details!
      •Decide when to conduct the review.
      •Determine who should attend the season review.
      •Set ground rules for the meeting in advance.
      •Set basic questions to use as a guideline for discussion.
      •Share and build on the results of the lessons learned.

      Wendy Walker is an experienced tax information reporting professional with over 15 years of reporting and compliance experience. In her former roles at Zions Bancorporation and Chase, she managed compliance and operations functions (and teams) associated with US withholding tax and 1099, 1042-S, and state reporting. Additionally, Wendy was the FATCA Reporting Officer at Zions, responsible for researching and advising the various lines of business of their obligations.

      Read more >
    • 12 Most Common Questions in a Client Data Protection Audit 12 Most Common Questions in a Client Data Protection Audit Tony Themelis, VP of Product Strategy, Digital Guardian Recorded: Aug 26 2015 3:00 pm UTC 34 mins
    • Are you ready for your next security audit from one of your most important customers? This webinar will help you gauge your readiness and identify areas you need to improve.

      Sophisticated cybercriminals have identified third party suppliers and service providers as a lucrative back door to steal sensitive corporate information. Consequently, many companies are facing increasing pressure to meet stringent data protection audits from their largest clients.

      Based on our experience with a range of customers who have had to meet stringent partner data protection security audits, we’ve identified the most common data protection audit questions.
      – The 12 most common questions in a client data protection audit
      – What the client is really looking for with each question
      – Guidance on your “audit readiness”

      Read more >
    • Tracking the most significant cyber threat: Ransomware Tracking the most significant cyber threat: Ransomware Dan Hubbard, CTO at OpenDNS, and Dean De Beer, Principal Engineer at AMP Threat Grid Recorded: Apr 13 2016 6:00 pm UTC 52 mins
    • Imagine losing access to all of your critical data — only to find out you are being extorted by criminals who require payment in order to get it back. This is happening at an alarming rate and is commonly referred to as Ransomware.

      While these attacks are most prevalent on employee laptops, ransomware is now targeting departmental file servers and other critical infrastructure.

      But, there are steps you can take to better protect your company and reduce the risk of ransomware infections — and OpenDNS and Cisco have been at the forefront helping our customers against various versions of ransomware.

      Join this webcast with experts from Cisco including Dan Hubbard, CTO at OpenDNS, and Dean De Beer, Principal Engineer at AMP Threat Grid, as they discuss steps you can take to reduce the risk of ransomware infections.

      Learn how:
      - Ransomware has evolved and what we know about it today
      - To predict what ransomware might do next
      - You can identify the Internet infrastructure used by the attackers to connect, control, and transfer the encryption keys

      Read more >
    • Minimizing Data Threats: How to Protect Your Most Precious Resource Minimizing Data Threats: How to Protect Your Most Precious Resource David Lingenfelter, CSA Mobile Working Group Co-Chair Recorded: Mar 15 2016 9:40 pm UTC 25 mins
    • According to Netskope, the average organization has 730 cloud apps in use, and 90.8% aren't enterprise-ready.* This puts the corporate data you're charged with securing at risk. And as workers continue to use consumer-grade cloud apps to share, access and create corporate data, it's clear that these threats aren't going away. So how can enterprise IT proactively mitigate these risks and protect the integrity of its most precious resource?

      Watch this on-demand webinar, featuring Co-Chair of the Cloud Security Alliance (CSA)'s Mobile Working Group David Lingenfelter, to learn:

      •Key considerations for minimizing the inherent risks embedded within mobile computing
      •Critical vulnerabilities associated with the introduction of IoT in the enterprise, and best practices for mitigation
      •How the CSA's Cloud Controls Matrix (CCM) provides enterprise IT with a framework for global, implementation-ready controls to prevent and manage cloud-centric information-security risks

      Read more >
    • Getting The Most Out Of The Data You Already Have Getting The Most Out Of The Data You Already Have Adam Rossow, CMO, iModerate Recorded: Jan 20 2016 7:00 pm UTC 40 mins
    • Be honest - are you currently fully leveraging the data you already have? If you are like most marketers, the answer is likely 'No.'

      Today's consumers take full advantage of their ability to share their perceptions of, experiences with, and feelings toward a brand – whether brand-driven (e.g., CSAT surveys or brand perception studies) or consumer-generated (e.g., social commentary or product reviews). Yet many marketers aren’t making the most of all of this valuable information flowing into their dashboards, CRMs, and survey platforms. The energy seems to be placed on the capturing of the data rather than its utilization.

      You are likely already sitting on a gold mine of insights. The question is - how can you transform the customer feedback you already have into the actionable intelligence your brand(s) need to succeed?

      Join Adam Rossow, CMO of iModerate, for this informative, actionable, and free webinar where you will learn:

      • What types of data marketers are neglecting instead of harnessing

      • How to derive meaningful insight from these info streams without waiting weeks or breaking the bank

      • Additional opportunities to collect and leverage consumer feedback through pre-existing platforms

      Read more >
    • Avoiding the Most Common VDI Deployment Pitfalls Avoiding the Most Common VDI Deployment Pitfalls Vincent LaPaglia, Sr. Storage Engineer, NexGen Recorded: Aug 27 2015 5:00 pm UTC 44 mins
    • 3 Topics That Will Dominate VMworld 2015 - #3: Avoiding the Most Common VDI Deployment Pitfalls

      Architecting a successful VDI infrastructure is a challenging endeavor; the need for on-demand performance, redundancy and scalability are key components. Traditionally most VDI performance problems tend to be related to IO and storage, so making the right design decisions, choosing the right storage platform, and avoiding some common deployment/management pitfalls are key to VDI success. Join Vincent LaPaglia, Senior Storage Engineer at NexGen Storage as he examines these VDI challenges and how you can avoid these within your VDI infrastructure.

      Check out the other two webinars in this series:

      Read more >
    • CISO’s Words of Wisdom: How To Address The Most Pressing Challenges in Healthcar CISO’s Words of Wisdom: How To Address The Most Pressing Challenges in Healthcar Doug Copley, Martin Edwards, Jessica Morrison Recorded: Jun 24 2015 8:25 pm UTC 57 mins
    • Data breaches in the healthcare industry have had a 600 percent increase in 2014 alone. Current CISOs are now managing to the question of WHEN they will be breached, not IF they will be breached. Savvy CISOs develop sound strategies and practical initiatives to tackle the most pressing security issues within their industry and company environment.

      In this live panel discussion, Doug Copley, the CISO of Beaumont Health System and Chairman of the Michigan Healthcare Cybersecurity Council, and Dell Security and Compliance experts share strategies and insights on how to face these challenges with confidence.
      Key takeaways:
      •How to securely manage access to patient information without slowing down clinical workflows
      •How to manage security risks with Business Associates and other vendors
      •How to benefit from the productivity gains while addressing the security risks of BYOD
      •How to better prepare for IT audits and regulatory examinations (PCI 3.0 requirements, OCR and HIPAA)

      Read more >
    • Getting the Most out of Panorama Getting the Most out of Panorama Joerg Sieber, Sr. Product Marketing Manager Recorded: Mar 29 2016 6:00 pm UTC 37 mins
    • Deploying Panorama network security management goes a long way in streamlining, consolidating and simplifying operations of your security deployments. However, many deployments of Panorama don’t take full advantage of the extensive capabilities and deployment flexibility of the product. Deployment of dedicated log collectors and management hardware in high availability are all accompanied with major benefits, such as improved security, faster operations, and increase availability. Join us at this informative webinar to learn how best to deploy Panorama network security management and take advantage of all of its capabilities.

      Read more >
    • How the most successful apps drive massive engagement and monetization How the most successful apps drive massive engagement and monetization John Koetsier; VP Research VentureBeat Recorded: Mar 4 2015 6:00 pm UTC 60 mins
    • Speakers:
      John Koetsier: VP Research; VentureBeat
      Jen Kavanagh: EVP, General Manager (US); Beamly

      The biggest apps and the most successful enterprises do things differently. Mobile marketing automation is how Subway Surfer improves monetization. It's how Starbucks engages deeper with its customers. And it's how Plants vs Zombies gets you back.

      We surveyed 375 mobile developers with over 900 million monthly average users to find the best mobile marketing automation platforms. Then we analyzed 1.8 million apps in Google Play and the iOS app store, conducted 17 live interviews, and surveyed 19 MMA providers.

      The result is the most complete report on mobile marketing automation available.

      Read more >