Why should researchers care about research integrity? After all, they do not engage in any questionable research practices, right? Well, as it turns out, 70% of scientists in a recent survey conducted by Nature Publishing Group think there's a problem with reproducibility or have had problems replicating another researcher's work. In this presentation, we'll discuss what Elsevier is doing to maintain and improve the reliability of research and talk about practical steps researchers can take to make their own research more robust, as well.Read more >
As the automotive industry embraces software and connectivity to deliver innovative features and functionality, the code bases of in-vehicle systems have grown exponentially, sustained by increasingly complex software supply chains. The pace and magnitude of this change challenges the incumbent resources and processes that OEMs and their suppliers possess to test and harden these interconnected and often safety-critical systems. This paradigm, compounded by the evolving threat landscape and sophistication of cyber attackers, is elevating the level of risk associated with automotive software quality, security, and compliance. As demonstrated by recent vehicles hacks and the subsequent recalls and unwanted attention from regulators and mainstream media, insecure software poses a very real threat to the automotive industry.
Join Chris Rommel of VDC Research and John Jacott of Synopsys’ Software Integrity Group as they explore the mounting software challenges faced by OEMs and their suppliers. Learn how the automotive industry can adapt by leveraging existing solutions and best practices to drive down risk while maintaining agility and the innovative edge that modern technology affords.
Another widespread cyber attack in late June wreaked havoc across businesses, organizations, banks, government agencies, utility companies, shipping companies, and even power plants. Was this a ransomware attack or something more sinister?
Join this panel of industry leaders and security experts for an interactive session on:
- Why cybersecurity is a key focus for enterprises and organizations worldwide
- Why ransomware protection is more crucial than ever
- How to best prepare against future cyber attacks
- Steps your organization should take today to ensure data security. Short term steps and long-term strategy
- May Wang, Co-founder & CTO of ZingBox
- Ted Harrington, Executive Partner at Independent Security Evaluators
- Mike Ahmadi, Director of Critical Systems Security, Synopsys Software Integrity Group
- Eric Hanselman, Chief Analyst at 451 Research
The scene is changing: classic compromises like stolen data or defaced websites are no longer the only threats to organizations. Hackers are launching high-speed attacks on a global scale, shutting down networks with WannaCry ransomware and targeting IoT devices to disrupt the internet. But attackers are also wreaking havoc in stealthier ways, waiting quietly on networks in order to undermine the very integrity of data.
Today’s rapidly evolving threat landscape demands a fundamentally different approach to cyber defense. To level the playing field, organizations across the globe are turning to self-defending cyber ‘immune systems’ to autonomously respond to in-progress threats, in real time. Leveraging advances in machine learning and AI algorithms, Darktrace Antigena is the only proven solution capable of fighting back against this new era of cyber-threat.
Innovation Sessions 2017 #5
Poor data quality can have serious financial consequences. Regulatory fines, monetary losses from bad business decisions, and legal fees resulting from errors can add up to millions of dollars. When it comes to patient or consumer safety, bad data can cost lives.
This webinar will highlight effective steps for preventing and fixing bad data, and processes to help ensure optimum integrity in your data. Best practices in data quality and real-world success stories will be featured.
Sign up today!
This webinar will review minimum EPA requirements and best practice for assessment and reporting on the integrity of retaining structures such as bunds (tank bunds, pallet bunds, bunded drum storage, etc..) and effluent pipelines and identify common areas where improvements can be made. The EPA would also welcome questions as part of this webinar and time will be allowed at the end of the webinar for this.Read more >
The widespread adoption of DevOps and agile IT delivery systems presents new security challenges. Developers need security tools that are integrated with their build processes so they can test the integrity and security of their applications within minutes. Similarly, infosec managers need security tools that automatically discover and protect new applications as they are delivered via rapid automation and elastic processes. But traditional security tools don’t do either of these things. Thus, security is increasingly viewed as a blocker to agile software development and DevOps deployment. To solve this problem, security has to fundamentally evolve from a production-time concept to something that is much more automated and embedded into the dev-test-build cycle itself,
Attend this webinar to learn:
•Why trying to use traditional security tools in DevOps environments will slow down both developers and security operations
•Key attributes you should be thinking about to make your security plan future-proof
•Where can security automation be applied to better align security with DevOps delivery models
Smart stadiums, connected healthcare, personalized retail experiences are just a few industries where the Internet of Things (IoT) is fundamentally changing the boundaries of cyber and physical security. Once separate, isolated business critical systems are now connected. Medical devices monitoring patient health during operations sit side by side with guest wifi networks. HVAC and coach communication systems run in the same environment as the interactive fan experience, all critical to today’s stadium experience. Retail point of sale (POS) systems are connected to inventory management robots in grocery stores.
Join this webinar and learn more about:
- How security programs must adapt to an IoT connected world
- Why isolation is no longer a practical solution for protecting critical systems
- Cybersecurity risks stemming from the IoT
This talk will explore and discuss how security programs must adapt to an IoT connected world where isolation is no longer a practical solution for protecting critical systems and their customers. As the IoT is integrated into nearly every aspect of a modern business, cyber-related risks elevate from a primary focus on data, to that of physical facilities integrity and business availability.
Modern, data-driven businesses are employing data-management methods to establish trust, transparency, auditability, consistency, and control. The business impacts are tangible: greater efficiency, increased revenue, and strengthened customer relationships.
In this webinar, Toph Whitmore, Blue Hill Research principal analyst for Big Data & Analytics, and Jake Freivald, Information Builders vice president of product marketing show how innovative BI technology is enabling forward-thinking companies to reinvent traditional business models.
Enterprises use value at risk metrics to drive most strategic decisions, except when it comes to cyber risk. Prioritizing cyber risk response and remediation is typically a guessing game that requires experts to work with the cyber and business teams to try to guesstimate probabilities of particular events and their ability to compromise each application's confidentiality, integrity and availability. Without calculating a dollar amount impact to which the business is exposed, stakeholders enterprise-wide have no way of knowing the most potentially damaging vulnerabilities and threats within their environment.
This webinar will discuss why enterprises must embrace quantifying cyber risk as they do in all other parts of the business and how they can calculate the financial impact metrics needed to drive faster and more effective decision making.
Everyone is on Facebook, right? Wrong. Every day, there are new social media platforms launching and diluting the impact each social media platform has. And while we’re in the era of social media dominance, there’s still a large population that falls under “non-social savvy.” Believe it or not.
This session will help us understand today’s social media landscape and help brands and marketers discover what the right platforms are for their audience. It will also dig into key marketing tools and metrics that help engage and attract the target customer and dial into why having a responsive process is critical for brand visibility, integrity, and equity.
Today’s electronic systems are more intelligent, more connected, and more at risk than ever before. A single vulnerability can lead to widespread system-of-systems compromises. Organizations participating in security-critical industries like Aerospace and Defense (A&D) are especially at risk.
In this webinar, Christopher Rommel from VDC and Joe Jarzombek from Synopsys will discuss the results from a recent report highlighting issues facing these organizations. They will also identify what considerations need to be made for the security of software that enables and controls system functionality.
This webinar will explore:
• The importance of quality and security in current projects
• The amount of code re-use from previous projects
• How automated quality and security testing tools can integrate into your current SDLC
Organizations are investing in analytic tools to meet discovery needs of analysts, only to find out they can’t operate in a unified manner across the enterprise. The lack of support for data preparation, reporting and effective dashboards – and the amount of resources and time to achieve full spectrum self-service BI and analytics – results in significant frustration.
Join Ventana Research and Information Builders at this webcast to learn how to:
- Establish a unified approach to analytics and business intelligence
- Avoid the discovery tool dilemma that has complicated self-service and created more confusion for business
- Get data visualization that helps guide actions and make decisions in a timely manner
- Eliminate the gaps and data discrepancies associated with data discovery tools
Firms are changing the way that they perform reconciliations. The large amounts of regulation affecting firms has placed data integrity high up the priority list. Reconciling across systems internally and externally, whilst having access to the correct reference data sources is an issue.
In this webinar CEB TowerGroup will present their new research into financial services and why firms are looking differently about how they reconcile their regulatory data.
UnaVista will provide a regulators perspective on what they look for in reported data, and some insight into how technology can help firms put the correct systems and controls in place. There will then be case study from a large buy-side firm on how they address their data integrity for regulations.
- CEB Market Analysis 2016 - Gert Raeves, CEB TowerGroup
- Regulators perspective - Tom Wieczorek, UnaVista, LSEG
- Technology's role in assisting firms with data integrity - Tom Wieczorek, UnaVista, LSEG
- Industry case study - Tom Wieczorek, UnaVista, LSEG
Professional analysts have data discovery tools, but what about the 100 million working professionals who need information at a glance? BI tools require a learning curve. A dashboard may be showing the right metrics, but is it telling the right story?
Join Forrester Research and Information Builders at this webcast to learn why InfoApps™ can fulfil the promise of pervasive BI. Learn how these simple BI apps can answer basic questions – ideally, with a user interface that has been tailored to the job function at hand. You’ll see:
- 4 key data visualization design steps that can turn insights into action more effectively
- The difference between a dashboard and an InfoApp
- How to deploy InfoApps to employees for better operational processes and decision-making
- How to deploy InfoApps to customers and partners to create competitive advantage
Risk flows to the least-secure. Hackers will target what they see as the weakest link. Given the unrelenting security attacked we've seen in 2016 - and their high costs - you don't want your company to be seen as a target in 2017.
Join 451 Research and OneLogin as we explore the current state of identity security and share best practice findings on what security initiatives you should pursue in 2017, including:
HR-driven IDaaS for high-integrity on- and off-boarding
Automated threat response with CASB/IDaaS integration
Application threat aware integration with IDaaS/SIEM integration
Unified Endpoint Management to extend cloud security to all devices
Protecting sensitive information is especially difficult for corporations that have data stores scattered in physical, virtual and cloud-based repositories across the globe.
Not only do these multinational organizations need to protect their data from countless threat actors, they must contend with exploding data growth and constantly changing, oftentimes contradictory privacy regulations in the countries where they do business.
Attend this webinar and learn how you can:
•Understand data proliferation (AKA the "data monster")
•Determine the intersection of data security risk and data management
•Create a 360-degree view of your data risks
•Deliver on-demand intelligence for audit and governance programs
•Eliminate costly and error-prone manual efforts in securing your data
Innovation Sessions 2017 #3
With such a focus on data governance – how our data is curated, organized, and accessed – we sometimes forget to govern how our data is actually used in BI and analytics.
After providing self-service tools to their users, businesses are finding a proliferation of shadow IT environments: something like Excel Hell, but based on new Agile BI tools rather than spreadsheets.
The result is rapidly created shadow-IT BI applications that aren’t curated, governed, or scalable, or rock-solid BI applications that aren’t agile.
In this webinar, Forrester analyst Boris Evelson will discuss how to apply BI governance to get the agility of self-service without a proliferation of shadow IT.
Sign up today!
With dramatic increases in prescription opioid availability, usage and spending, this session will explore popular fraud schemes associated with drug abuse and discuss effective data mining to identify such behavior. This session will help investigators combat the opioid epidemic through discussion of contributing factors of opioid availability, common fraud schemes used by drug seekers and Federal and State intervention strategies aimed at reducing prescription opioid abuse.Read more >
Although many companies use Hadoop to help a few high-powered data scientists gain valuable insight, turning insights into action remains a challenge.
In this webcast hosted by Information Builders, featuring Boris Evelson, Vice President, Forrester Research, you’ll learn how to channel the power and freedom of Hadoop into operational actions that will provide better outcomes for your company.
- Enable flexible Hadoop data discovery while getting consistent results across different users
- Take the insights found by data scientists and harness them for a larger, non-technical audience
- Flow Hadoop-derived insights directly into operational processes
Boris Evelson, Vice President, Forrester Research
Boris Evelson serves business process professionals. A leading expert in BI with Forrester Research, Boris delivers strategic guidance that helps enterprises define BI strategies, governance, and architectures, and identify vendors and technologies that help them put information to use in business processes and end-user experiences.
Jake Freivald, Vice President of Product Marketing, Information Builders
Mr. Freivald is responsible for messaging strategy, content creation, and thought leadership for the WebFOCUS BI and analytics, iWay data integrity, and iWay integration product lines. He joined Information Builders in 1999 as a product manager for the Data Warehouse division, where he supported cross-platform product development and deployment.
In today’s world of bi-modal IT, the battle continues to rage between CMOs wanting to make rapid-fire technology purchasing decisions and IT teams struggling to balance business integrity while at the same time evaluating and implementing new technologies. That battle is never truer than when it comes to Partner Relationship Management (PRM) solutions, which have been proven to as much as double indirect sales, but are often bogged down by organizational alignment issues. This new webinar featuring Global SaaS PRM leader Impartner CMO Dave R Taylor and Gartner Research Director and PRM Analyst Ilona Hansen, outlines the following five key questions sales and marketing pros need to ask up front to streamline PRM purchase decisions with IT.Read more >