Why should researchers care about research integrity? After all, they do not engage in any questionable research practices, right? Well, as it turns out, 70% of scientists in a recent survey conducted by Nature Publishing Group think there's a problem with reproducibility or have had problems replicating another researcher's work. In this presentation, we'll discuss what Elsevier is doing to maintain and improve the reliability of research and talk about practical steps researchers can take to make their own research more robust, as well.Read more >
Join PADT for an introduction into signal integrity (SI), some of the challenges related to it, how to identify if you are at risk of SI related failure, and what you can do about it.Read more >
Join PADT to learn how ANSYS can help you identify Signal Integrity problems and optimize potential solutions faster and cheaper than prototyping multiple iterations.Read more >
Using the Internet of Things (IoT) to access data about customers, products, and assets sounds great. But the technology is complicated – and it requires new skills and behaviors.
In this session, Forrester's Frank Gillett will help untangle your IoT strategies by outlining the three business scenarios that IoT enables. He'll review a set of use cases for each scenario so you can assess which ones apply to your company. He will also delve into a few data analysis challenges that emerge from implementing IoT use cases.
As the automotive industry embraces software and connectivity to deliver innovative features and functionality, the code bases of in-vehicle systems have grown exponentially, sustained by increasingly complex software supply chains. The pace and magnitude of this change challenges the incumbent resources and processes that OEMs and their suppliers possess to test and harden these interconnected and often safety-critical systems. This paradigm, compounded by the evolving threat landscape and sophistication of cyber attackers, is elevating the level of risk associated with automotive software quality, security, and compliance. As demonstrated by recent vehicles hacks and the subsequent recalls and unwanted attention from regulators and mainstream media, insecure software poses a very real threat to the automotive industry.
Join Chris Rommel of VDC Research and John Jacott of Synopsys’ Software Integrity Group as they explore the mounting software challenges faced by OEMs and their suppliers. Learn how the automotive industry can adapt by leveraging existing solutions and best practices to drive down risk while maintaining agility and the innovative edge that modern technology affords.
In this webcast, Dr Jim Baxter from the Inter-Disciplinary Ethics Applied (IDEA) Centre at the University of Leeds discusses how organisations can build a culture of integrity. In the first part of the presentation, Jim will address what it means to have integrity, both for an individual and for an organisation. From here, Jim will go on to consider some barriers to the successful promotion of integrity, and finally will discuss a number of ways in which employees can contribute to an ethical culture within their own organisation. The webcast will draw on insights from academic ethics, and also on a substantial piece of research, involving 92 interviews in 15 different UK organisations, which Jim carried out in 2012. The webcast will be interactive and practically focused, concentrating on methods which participants can use in their own organisation.
Dr Jim Baxter is an academic consultant working at the Inter-Disciplinary Ethics Applied (IDEA) Centre at the University of Leeds. Jim manages the IDEA Centre’s training, consultancy and applied research portfolio, providing ethical review and consultancy services, training and continuing professional development, as well as applied research, to a wide range of organisations including professional bodies, public bodies and private sector businesses. He recently completed his PhD on the moral responsibility of psychopaths.
Jim is the main researcher and author of the report Real Integrity: Practical solutions for organisations seeking to promote and encourage integrity.
Today’s government and commercial health care market is in a constant state of change. Both government agencies and private insurers need to bring value through more effective claims, clinical targeting and revenue optimization. And payers are looking for single-source system that delivers an innovative, broad spectrum of services to fill gaps in their existing processes and improve outcomes.
During this session we’ll look at a payment integrity approach that delivers results. We’ll also share case studies to show how you can use analytics to create measurable financial impact for both government and commercial payers and providers.
We’ll review four key disciplines, including:
Another widespread cyber attack in late June wreaked havoc across businesses, organizations, banks, government agencies, utility companies, shipping companies, and even power plants. Was this a ransomware attack or something more sinister?
Join this panel of industry leaders and security experts for an interactive session on:
- Why cybersecurity is a key focus for enterprises and organizations worldwide
- Why ransomware protection is more crucial than ever
- How to best prepare against future cyber attacks
- Steps your organization should take today to ensure data security. Short term steps and long-term strategy
- May Wang, Co-founder & CTO of ZingBox
- Ted Harrington, Executive Partner at Independent Security Evaluators
- Mike Ahmadi, Director of Critical Systems Security, Synopsys Software Integrity Group
- Eric Hanselman, Chief Analyst at 451 Research
The scene is changing: classic compromises like stolen data or defaced websites are no longer the only threats to organizations. Hackers are launching high-speed attacks on a global scale, shutting down networks with WannaCry ransomware and targeting IoT devices to disrupt the internet. But attackers are also wreaking havoc in stealthier ways, waiting quietly on networks in order to undermine the very integrity of data.
Today’s rapidly evolving threat landscape demands a fundamentally different approach to cyber defense. To level the playing field, organizations across the globe are turning to self-defending cyber ‘immune systems’ to autonomously respond to in-progress threats, in real time. Leveraging advances in machine learning and AI algorithms, Darktrace Antigena offers a solution capable of fighting back against this new era of cyber-threat
Companies can monetize one of their most valuable assets – their data – by making it easy for their customers to interact with and analyze it.
This presentation by Ventana Research's David Menninger will give research-based details on how organizations are using customer-facing analytics to increase customer retention, improve differentiation, and even derive new revenue. He'll also discuss the role of data quality and master data management (MDM), mobile, and related technologies in successfully monetizing the data that you're already collecting.
CISOs play an important role in our software-driven world, but what they do on a daily basis—and why—have largely remained a mystery—at least until we studied them in the wild and created the CISO Report.
Join us as Gary McGraw, CISO Report author and VP of security technology at Synopsys, along with analysts Scott Crawford and Dan Kennedy from 451 Research discuss the evolving role of the CISO and what this novel study reveals:
- What are the four newly identified CISO tribes, and which characteristics distinguish them?
- How can knowing your tribe advance your organization’s security initiatives and spur career development?
-Why does your CISO’s tribe reflect the priorities and dynamics within your organization?
Publish with integrity! This webinar will explore strategies to ensure your scientific findings meet the necessary standards of transparency and reproducibility and achieve the highest impact within the scientific community. Experts in the field of neuroscience will provide targeted presentations followed by a Q&A.
Dr. Natalia Ortuzar is the Associate Editorial Director for Wiley-owned life and physical sciences journals in North America. Her team works on over 80 journals, covering topics from neuroscience and cell biology through to engineering and statistics. With a decade of publishing experience, Natalia has a background in open-access publishing and expertise in copyright and publishing ethics, as well as an intimate knowledge of the publishing process, from submission through peer review to production and post-publication, as an author, reviewer, and editor.
Dr. Prager is the Editor-in-Chief for the Journal of Neuroscience Research and the Developmental Editor for Current Protocols in Neuroscience and Current Protocols in Toxicology. Dr. Prager earned his Ph.D. from the Uniformed Services University in Neuroscience, where he investigated the long-term consequences of a nerve agent exposure. Cooperating with groups from the NIH and the National Centre for the Replacement, Refinement & Reduction of Animals in Research, Dr. Prager has developed new guidelines to promote transparent science and increase reproducibility of published research.
Procurement fraud is prevalent. How can you thwart an attack? How can you prevent some of the most common themes like collusion and false claims?
Listen to our experts as they take a high-level approach to explaining the disruption to global businesses and how all industries are susceptible. You’ll learn about specific problems and how analytics provides answers.
The DevOps revolution continues to advance – and security must advance with it. Too often, however, approaches to application security remain stuck in the past. Throwing security assessment results over the fence to developers never really worked, and it certainly won’t survive the transition to DevOps and CI/CD, where agile techniques and automation set a demanding pace.
In this webinar, Scott Crawford, Research Director of Information Security with 451 Research, and Meera Subbarao with Synopsys, will highlight:
•The many points of opportunity DevOps present to engage in real collaboration across security, development and operations teams (it’s not just about testing!)
•How DevOps introduces opportunities to “shift left” with the security investment, and reduce the cost impact of security remediation and response
•Where and how security efforts can capitalize on automation and integration with DevOps toolsets
•Sourcing expertise: Security and development both require specialized expertise. Security in DevOps requires a unique mix of both. How can you find it?
This webinar will review minimum EPA requirements and best practice for assessment and reporting on the integrity of retaining structures such as bunds (tank bunds, pallet bunds, bunded drum storage, etc..) and effluent pipelines and identify common areas where improvements can be made. The EPA would also welcome questions as part of this webinar and time will be allowed at the end of the webinar for this.Read more >
The widespread adoption of DevOps and agile IT delivery systems presents new security challenges. Developers need security tools that are integrated with their build processes so they can test the integrity and security of their applications within minutes. Similarly, infosec managers need security tools that automatically discover and protect new applications as they are delivered via rapid automation and elastic processes. But traditional security tools don’t do either of these things. Thus, security is increasingly viewed as a blocker to agile software development and DevOps deployment. To solve this problem, security has to fundamentally evolve from a production-time concept to something that is much more automated and embedded into the dev-test-build cycle itself,
Attend this webinar to learn:
•Why trying to use traditional security tools in DevOps environments will slow down both developers and security operations
•Key attributes you should be thinking about to make your security plan future-proof
•Where can security automation be applied to better align security with DevOps delivery models
Smart stadiums, connected healthcare, personalized retail experiences are just a few industries where the Internet of Things (IoT) is fundamentally changing the boundaries of cyber and physical security. Once separate, isolated business critical systems are now connected. Medical devices monitoring patient health during operations sit side by side with guest wifi networks. HVAC and coach communication systems run in the same environment as the interactive fan experience, all critical to today’s stadium experience. Retail point of sale (POS) systems are connected to inventory management robots in grocery stores.
Join this webinar and learn more about:
- How security programs must adapt to an IoT connected world
- Why isolation is no longer a practical solution for protecting critical systems
- Cybersecurity risks stemming from the IoT
This talk will explore and discuss how security programs must adapt to an IoT connected world where isolation is no longer a practical solution for protecting critical systems and their customers. As the IoT is integrated into nearly every aspect of a modern business, cyber-related risks elevate from a primary focus on data, to that of physical facilities integrity and business availability.
To learn more about the realities of DevSecOps today and the real degree to which security is or is not being included in enterprise continuous integration/continuous delivery workflows, we surveyed 350 decision-makers at large enterprises across a variety of industries.
What we found is that only about half of enterprise CI/CD workflows include any security elements at all, highlighting ample room for improvement. Enterprises did seem to show an awareness of the importance of adding security elements into DevOps releases, but they are not necessarily injecting security early in the process -- ideally at code commit and in pre-implementation. This webinar will cover these and other results of our survey, and offer guidance on how enterprise organizations can effectively integrate security tools, thinking and people into their CI/CD workflows to reduce rework and risk without sacrificing velocity.
Modern, data-driven businesses are employing data-management methods to establish trust, transparency, auditability, consistency, and control. The business impacts are tangible: greater efficiency, increased revenue, and strengthened customer relationships.
In this webinar, Toph Whitmore, Blue Hill Research principal analyst for Big Data & Analytics, and Jake Freivald, Information Builders vice president of product marketing show how innovative BI technology is enabling forward-thinking companies to reinvent traditional business models.
By 2020, IDC forecasts that 60 percent of organizations will have developed a digital transformation strategy and will be in the process of implementing it. As data becomes more valuable to organizations, it becomes an increasingly attractive target for theft or malware attack. These threats are becoming both more numerous and more frequent, challenging IT organizations to protect traditional data loss threats as well as cyber-threats.
In this webinar led by IDC and the LTO Program, we will discuss key insights and analysis from IDC’s latest white paper Using Tape to Optimize Data Protection Costs and Defeat Malware for Data-Centric Organizations.
Join us for highlights from this report, including:
· The current and future state of the global datasphere
· Future outlook for LTO technology and how it fits into the changing data landscape
· Data protection best practices to safeguard against data loss threats and cyber-threats