Why should researchers care about research integrity? After all, they do not engage in any questionable research practices, right? Well, as it turns out, 70% of scientists in a recent survey conducted by Nature Publishing Group think there's a problem with reproducibility or have had problems replicating another researcher's work. In this presentation, we'll discuss what Elsevier is doing to maintain and improve the reliability of research and talk about practical steps researchers can take to make their own research more robust, as well.Read more >
As the automotive industry embraces software and connectivity to deliver innovative features and functionality, the code bases of in-vehicle systems have grown exponentially, sustained by increasingly complex software supply chains. The pace and magnitude of this change challenges the incumbent resources and processes that OEMs and their suppliers possess to test and harden these interconnected and often safety-critical systems. This paradigm, compounded by the evolving threat landscape and sophistication of cyber attackers, is elevating the level of risk associated with automotive software quality, security, and compliance. As demonstrated by recent vehicles hacks and the subsequent recalls and unwanted attention from regulators and mainstream media, insecure software poses a very real threat to the automotive industry.
Join Chris Rommel of VDC Research and John Jacott of Synopsys’ Software Integrity Group as they explore the mounting software challenges faced by OEMs and their suppliers. Learn how the automotive industry can adapt by leveraging existing solutions and best practices to drive down risk while maintaining agility and the innovative edge that modern technology affords.
Today’s government and commercial health care market is in a constant state of change. Both government agencies and private insurers need to bring value through more effective claims, clinical targeting and revenue optimization. And payers are looking for single-source system that delivers an innovative, broad spectrum of services to fill gaps in their existing processes and improve outcomes.
During this session we’ll look at a payment integrity approach that delivers results. We’ll also share case studies to show how you can use analytics to create measurable financial impact for both government and commercial payers and providers.
We’ll review four key disciplines, including:
Another widespread cyber attack in late June wreaked havoc across businesses, organizations, banks, government agencies, utility companies, shipping companies, and even power plants. Was this a ransomware attack or something more sinister?
Join this panel of industry leaders and security experts for an interactive session on:
- Why cybersecurity is a key focus for enterprises and organizations worldwide
- Why ransomware protection is more crucial than ever
- How to best prepare against future cyber attacks
- Steps your organization should take today to ensure data security. Short term steps and long-term strategy
- May Wang, Co-founder & CTO of ZingBox
- Ted Harrington, Executive Partner at Independent Security Evaluators
- Mike Ahmadi, Director of Critical Systems Security, Synopsys Software Integrity Group
- Eric Hanselman, Chief Analyst at 451 Research
The scene is changing: classic compromises like stolen data or defaced websites are no longer the only threats to organizations. Hackers are launching high-speed attacks on a global scale, shutting down networks with WannaCry ransomware and targeting IoT devices to disrupt the internet. But attackers are also wreaking havoc in stealthier ways, waiting quietly on networks in order to undermine the very integrity of data.
Today’s rapidly evolving threat landscape demands a fundamentally different approach to cyber defense. To level the playing field, organizations across the globe are turning to self-defending cyber ‘immune systems’ to autonomously respond to in-progress threats, in real time. Leveraging advances in machine learning and AI algorithms, Darktrace Antigena offers a solution capable of fighting back against this new era of cyber-threat
CISOs play an important role in our software-driven world, but what they do on a daily basis—and why—have largely remained a mystery—at least until we studied them in the wild and created the CISO Report.
Join us as Gary McGraw, CISO Report author and VP of security technology at Synopsys, along with analysts Scott Crawford and Dan Kennedy from 451 Research discuss the evolving role of the CISO and what this novel study reveals:
- What are the four newly identified CISO tribes, and which characteristics distinguish them?
- How can knowing your tribe advance your organization’s security initiatives and spur career development?
-Why does your CISO’s tribe reflect the priorities and dynamics within your organization?
Publish with integrity! This webinar will explore strategies to ensure your scientific findings meet the necessary standards of transparency and reproducibility and achieve the highest impact within the scientific community. Experts in the field of neuroscience will provide targeted presentations followed by a Q&A.
Dr. Natalia Ortuzar is the Associate Editorial Director for Wiley-owned life and physical sciences journals in North America. Her team works on over 80 journals, covering topics from neuroscience and cell biology through to engineering and statistics. With a decade of publishing experience, Natalia has a background in open-access publishing and expertise in copyright and publishing ethics, as well as an intimate knowledge of the publishing process, from submission through peer review to production and post-publication, as an author, reviewer, and editor.
Dr. Prager is the Editor-in-Chief for the Journal of Neuroscience Research and the Developmental Editor for Current Protocols in Neuroscience and Current Protocols in Toxicology. Dr. Prager earned his Ph.D. from the Uniformed Services University in Neuroscience, where he investigated the long-term consequences of a nerve agent exposure. Cooperating with groups from the NIH and the National Centre for the Replacement, Refinement & Reduction of Animals in Research, Dr. Prager has developed new guidelines to promote transparent science and increase reproducibility of published research.
Procurement fraud is prevalent. How can you thwart an attack? How can you prevent some of the most common themes like collusion and false claims?
Listen to our experts as they take a high-level approach to explaining the disruption to global businesses and how all industries are susceptible. You’ll learn about specific problems and how analytics provides answers.
In this webcast, Dr Jim Baxter from the Inter-Disciplinary Ethics Applied (IDEA) Centre at the University of Leeds discusses how organisations can build a culture of integrity. In the first part of the presentation, Jim will address what it means to have integrity, both for an individual and for an organisation. From here, Jim will go on to consider some barriers to the successful promotion of integrity, and finally will discuss a number of ways in which employees can contribute to an ethical culture within their own organisation. The webcast will draw on insights from academic ethics, and also on a substantial piece of research, involving 92 interviews in 15 different UK organisations, which Jim carried out in 2012. The webcast will be interactive and practically focused, concentrating on methods which participants can use in their own organisation.
Dr Jim Baxter is an academic consultant working at the Inter-Disciplinary Ethics Applied (IDEA) Centre at the University of Leeds. Jim manages the IDEA Centre’s training, consultancy and applied research portfolio, providing ethical review and consultancy services, training and continuing professional development, as well as applied research, to a wide range of organisations including professional bodies, public bodies and private sector businesses. He recently completed his PhD on the moral responsibility of psychopaths.
Jim is the main researcher and author of the report Real Integrity: Practical solutions for organisations seeking to promote and encourage integrity (available in attachments tab).
The DevOps revolution continues to advance – and security must advance with it. Too often, however, approaches to application security remain stuck in the past. Throwing security assessment results over the fence to developers never really worked, and it certainly won’t survive the transition to DevOps and CI/CD, where agile techniques and automation set a demanding pace.
In this webinar, Scott Crawford, Research Director of Information Security with 451 Research, and Meera Subbarao with Synopsys, will highlight:
•The many points of opportunity DevOps present to engage in real collaboration across security, development and operations teams (it’s not just about testing!)
•How DevOps introduces opportunities to “shift left” with the security investment, and reduce the cost impact of security remediation and response
•Where and how security efforts can capitalize on automation and integration with DevOps toolsets
•Sourcing expertise: Security and development both require specialized expertise. Security in DevOps requires a unique mix of both. How can you find it?
Innovation Sessions 2017 #5
Poor data quality can have serious financial consequences. Regulatory fines, monetary losses from bad business decisions, and legal fees resulting from errors can add up to millions of dollars. When it comes to patient or consumer safety, bad data can cost lives.
This webinar will highlight effective steps for preventing and fixing bad data, and processes to help ensure optimum integrity in your data. Best practices in data quality and real-world success stories will be featured.
Sign up today!
This webinar will review minimum EPA requirements and best practice for assessment and reporting on the integrity of retaining structures such as bunds (tank bunds, pallet bunds, bunded drum storage, etc..) and effluent pipelines and identify common areas where improvements can be made. The EPA would also welcome questions as part of this webinar and time will be allowed at the end of the webinar for this.Read more >
The widespread adoption of DevOps and agile IT delivery systems presents new security challenges. Developers need security tools that are integrated with their build processes so they can test the integrity and security of their applications within minutes. Similarly, infosec managers need security tools that automatically discover and protect new applications as they are delivered via rapid automation and elastic processes. But traditional security tools don’t do either of these things. Thus, security is increasingly viewed as a blocker to agile software development and DevOps deployment. To solve this problem, security has to fundamentally evolve from a production-time concept to something that is much more automated and embedded into the dev-test-build cycle itself,
Attend this webinar to learn:
•Why trying to use traditional security tools in DevOps environments will slow down both developers and security operations
•Key attributes you should be thinking about to make your security plan future-proof
•Where can security automation be applied to better align security with DevOps delivery models
Smart stadiums, connected healthcare, personalized retail experiences are just a few industries where the Internet of Things (IoT) is fundamentally changing the boundaries of cyber and physical security. Once separate, isolated business critical systems are now connected. Medical devices monitoring patient health during operations sit side by side with guest wifi networks. HVAC and coach communication systems run in the same environment as the interactive fan experience, all critical to today’s stadium experience. Retail point of sale (POS) systems are connected to inventory management robots in grocery stores.
Join this webinar and learn more about:
- How security programs must adapt to an IoT connected world
- Why isolation is no longer a practical solution for protecting critical systems
- Cybersecurity risks stemming from the IoT
This talk will explore and discuss how security programs must adapt to an IoT connected world where isolation is no longer a practical solution for protecting critical systems and their customers. As the IoT is integrated into nearly every aspect of a modern business, cyber-related risks elevate from a primary focus on data, to that of physical facilities integrity and business availability.
Modern, data-driven businesses are employing data-management methods to establish trust, transparency, auditability, consistency, and control. The business impacts are tangible: greater efficiency, increased revenue, and strengthened customer relationships.
In this webinar, Toph Whitmore, Blue Hill Research principal analyst for Big Data & Analytics, and Jake Freivald, Information Builders vice president of product marketing show how innovative BI technology is enabling forward-thinking companies to reinvent traditional business models.
Enterprises use value at risk metrics to drive most strategic decisions, except when it comes to cyber risk. Prioritizing cyber risk response and remediation is typically a guessing game that requires experts to work with the cyber and business teams to try to guesstimate probabilities of particular events and their ability to compromise each application's confidentiality, integrity and availability. Without calculating a dollar amount impact to which the business is exposed, stakeholders enterprise-wide have no way of knowing the most potentially damaging vulnerabilities and threats within their environment.
This webinar will discuss why enterprises must embrace quantifying cyber risk as they do in all other parts of the business and how they can calculate the financial impact metrics needed to drive faster and more effective decision making.
Everyone is on Facebook, right? Wrong. Every day, there are new social media platforms launching and diluting the impact each social media platform has. And while we’re in the era of social media dominance, there’s still a large population that falls under “non-social savvy.” Believe it or not.
This session will help us understand today’s social media landscape and help brands and marketers discover what the right platforms are for their audience. It will also dig into key marketing tools and metrics that help engage and attract the target customer and dial into why having a responsive process is critical for brand visibility, integrity, and equity.
Today’s electronic systems are more intelligent, more connected, and more at risk than ever before. A single vulnerability can lead to widespread system-of-systems compromises. Organizations participating in security-critical industries like Aerospace and Defense (A&D) are especially at risk.
In this webinar, Christopher Rommel from VDC and Joe Jarzombek from Synopsys will discuss the results from a recent report highlighting issues facing these organizations. They will also identify what considerations need to be made for the security of software that enables and controls system functionality.
This webinar will explore:
• The importance of quality and security in current projects
• The amount of code re-use from previous projects
• How automated quality and security testing tools can integrate into your current SDLC
Organizations are investing in analytic tools to meet discovery needs of analysts, only to find out they can’t operate in a unified manner across the enterprise. The lack of support for data preparation, reporting and effective dashboards – and the amount of resources and time to achieve full spectrum self-service BI and analytics – results in significant frustration.
Join Ventana Research and Information Builders at this webcast to learn how to:
- Establish a unified approach to analytics and business intelligence
- Avoid the discovery tool dilemma that has complicated self-service and created more confusion for business
- Get data visualization that helps guide actions and make decisions in a timely manner
- Eliminate the gaps and data discrepancies associated with data discovery tools
Professional analysts have data discovery tools, but what about the 100 million working professionals who need information at a glance? BI tools require a learning curve. A dashboard may be showing the right metrics, but is it telling the right story?
Join Forrester Research and Information Builders at this webcast to learn why InfoApps™ can fulfil the promise of pervasive BI. Learn how these simple BI apps can answer basic questions – ideally, with a user interface that has been tailored to the job function at hand. You’ll see:
- 4 key data visualization design steps that can turn insights into action more effectively
- The difference between a dashboard and an InfoApp
- How to deploy InfoApps to employees for better operational processes and decision-making
- How to deploy InfoApps to customers and partners to create competitive advantage
Risk flows to the least-secure. Hackers will target what they see as the weakest link. Given the unrelenting security attacked we've seen in 2016 - and their high costs - you don't want your company to be seen as a target in 2017.
Join 451 Research and OneLogin as we explore the current state of identity security and share best practice findings on what security initiatives you should pursue in 2017, including:
HR-driven IDaaS for high-integrity on- and off-boarding
Automated threat response with CASB/IDaaS integration
Application threat aware integration with IDaaS/SIEM integration
Unified Endpoint Management to extend cloud security to all devices