Hi [[ session.user.profile.firstName ]]
Sort by:
    • Connected Cars: Driving Change in Automotive Software Security
      Connected Cars: Driving Change in Automotive Software Security Chris Rommel (VDC Research); John Jacott (Synopsys Software Integrity Group) Recorded: Apr 5 2016 3:00 pm UTC 64 mins
    • As the automotive industry embraces software and connectivity to deliver innovative features and functionality, the code bases of in-vehicle systems have grown exponentially, sustained by increasingly complex software supply chains. The pace and magnitude of this change challenges the incumbent resources and processes that OEMs and their suppliers possess to test and harden these interconnected and often safety-critical systems. This paradigm, compounded by the evolving threat landscape and sophistication of cyber attackers, is elevating the level of risk associated with automotive software quality, security, and compliance. As demonstrated by recent vehicles hacks and the subsequent recalls and unwanted attention from regulators and mainstream media, insecure software poses a very real threat to the automotive industry.

      Join Chris Rommel of VDC Research and John Jacott of Synopsys’ Software Integrity Group as they explore the mounting software challenges faced by OEMs and their suppliers. Learn how the automotive industry can adapt by leveraging existing solutions and best practices to drive down risk while maintaining agility and the innovative edge that modern technology affords.

      Read more >
    • Real Integrity: Promoting integrity in organisations
      Real Integrity: Promoting integrity in organisations Dr Jim Baxter Recorded: Mar 15 2018 1:00 pm UTC 64 mins
    • In this webcast, Dr Jim Baxter from the Inter-Disciplinary Ethics Applied (IDEA) Centre at the University of Leeds discusses how organisations can build a culture of integrity. In the first part of the presentation, Jim will address what it means to have integrity, both for an individual and for an organisation. From here, Jim will go on to consider some barriers to the successful promotion of integrity, and finally will discuss a number of ways in which employees can contribute to an ethical culture within their own organisation. The webcast will draw on insights from academic ethics, and also on a substantial piece of research, involving 92 interviews in 15 different UK organisations, which Jim carried out in 2012. The webcast will be interactive and practically focused, concentrating on methods which participants can use in their own organisation.

      Dr Jim Baxter is an academic consultant working at the Inter-Disciplinary Ethics Applied (IDEA) Centre at the University of Leeds. Jim manages the IDEA Centre’s training, consultancy and applied research portfolio, providing ethical review and consultancy services, training and continuing professional development, as well as applied research, to a wide range of organisations including professional bodies, public bodies and private sector businesses. He recently completed his PhD on the moral responsibility of psychopaths.

      Jim is the main researcher and author of the report Real Integrity: Practical solutions for organisations seeking to promote and encourage integrity.

      Read more >
    • Using Analytics to Drive Payment Integrity and Reduce Fraud
      Using Analytics to Drive Payment Integrity and Reduce Fraud Ricky Sluder, CFE, Principal Solution Architect, SAS Recorded: Jan 5 2018 8:55 pm UTC 56 mins
    • Today’s government and commercial health care market is in a constant state of change. Both government agencies and private insurers need to bring value through more effective claims, clinical targeting and revenue optimization. And payers are looking for single-source system that delivers an innovative, broad spectrum of services to fill gaps in their existing processes and improve outcomes.

      During this session we’ll look at a payment integrity approach that delivers results. We’ll also share case studies to show how you can use analytics to create measurable financial impact for both government and commercial payers and providers.

      We’ll review four key disciplines, including:

      Data management
      Claims analytics
      Behavioral analytics
      Clinical targeting

      Read more >
    • Publishing your Research: Enhancing Transparency and Rigor
      Publishing your Research: Enhancing Transparency and Rigor Natalia Ortuzar and Eric M. Prager Recorded: Dec 6 2017 6:00 pm UTC 58 mins
    • Publish with integrity! This webinar will explore strategies to ensure your scientific findings meet the necessary standards of transparency and reproducibility and achieve the highest impact within the scientific community. Experts in the field of neuroscience will provide targeted presentations followed by a Q&A.

      Speakers:
      Dr. Natalia Ortuzar is the Associate Editorial Director for Wiley-owned life and physical sciences journals in North America. Her team works on over 80 journals, covering topics from neuroscience and cell biology through to engineering and statistics. With a decade of publishing experience, Natalia has a background in open-access publishing and expertise in copyright and publishing ethics, as well as an intimate knowledge of the publishing process, from submission through peer review to production and post-publication, as an author, reviewer, and editor.

      Dr. Prager is the Editor-in-Chief for the Journal of Neuroscience Research and the Developmental Editor for Current Protocols in Neuroscience and Current Protocols in Toxicology. Dr. Prager earned his Ph.D. from the Uniformed Services University in Neuroscience, where he investigated the long-term consequences of a nerve agent exposure. Cooperating with groups from the NIH and the National Centre for the Replacement, Refinement & Reduction of Animals in Research, Dr. Prager has developed new guidelines to promote transparent science and increase reproducibility of published research.

      Read more >
    • Getting Application Security Up to Speed with DevOps
      Getting Application Security Up to Speed with DevOps Scott Crawford, Research Director of Information Security with 451 Research, Meera Subbarao with Synopsys, Recorded: Oct 10 2017 5:00 pm UTC 58 mins
    • The DevOps revolution continues to advance – and security must advance with it. Too often, however, approaches to application security remain stuck in the past. Throwing security assessment results over the fence to developers never really worked, and it certainly won’t survive the transition to DevOps and CI/CD, where agile techniques and automation set a demanding pace.

      In this webinar, Scott Crawford, Research Director of Information Security with 451 Research, and Meera Subbarao with Synopsys, will highlight:

      •The many points of opportunity DevOps present to engage in real collaboration across security, development and operations teams (it’s not just about testing!)
      •How DevOps introduces opportunities to “shift left” with the security investment, and reduce the cost impact of security remediation and response
      •Where and how security efforts can capitalize on automation and integration with DevOps toolsets
      •Sourcing expertise: Security and development both require specialized expertise. Security in DevOps requires a unique mix of both. How can you find it?

      Read more >
    • How to Optimize Security Controls for DevOps
      How to Optimize Security Controls for DevOps Adrian Sanabria, Senior Analyst at 451 Research, & Sami Laine, Principal Technologist at CloudPassage Recorded: Sep 29 2016 6:00 pm UTC 53 mins
    • The widespread adoption of DevOps and agile IT delivery systems presents new security challenges. Developers need security tools that are integrated with their build processes so they can test the integrity and security of their applications within minutes. Similarly, infosec managers need security tools that automatically discover and protect new applications as they are delivered via rapid automation and elastic processes. But traditional security tools don’t do either of these things. Thus, security is increasingly viewed as a blocker to agile software development and DevOps deployment. To solve this problem, security has to fundamentally evolve from a production-time concept to something that is much more automated and embedded into the dev-test-build cycle itself,

      Attend this webinar to learn:
      •Why trying to use traditional security tools in DevOps environments will slow down both developers and security operations
      •Key attributes you should be thinking about to make your security plan future-proof
      •Where can security automation be applied to better align security with DevOps delivery models

      Read more >
    • Securing Critical Systems in the Age of IoT
      Securing Critical Systems in the Age of IoT Aaron Turner, IANS IoT Research Faculty & Dimitri Vlachos, VP Marketing, Pwnie Express Recorded: Jun 21 2017 7:00 pm UTC 48 mins
    • Smart stadiums, connected healthcare, personalized retail experiences are just a few industries where the Internet of Things (IoT) is fundamentally changing the boundaries of cyber and physical security. Once separate, isolated business critical systems are now connected. Medical devices monitoring patient health during operations sit side by side with guest wifi networks. HVAC and coach communication systems run in the same environment as the interactive fan experience, all critical to today’s stadium experience. Retail point of sale (POS) systems are connected to inventory management robots in grocery stores.

      Join this webinar and learn more about:

      - How security programs must adapt to an IoT connected world
      - Why isolation is no longer a practical solution for protecting critical systems
      - Cybersecurity risks stemming from the IoT

      This talk will explore and discuss how security programs must adapt to an IoT connected world where isolation is no longer a practical solution for protecting critical systems and their customers. As the IoT is integrated into nearly every aspect of a modern business, cyber-related risks elevate from a primary focus on data, to that of physical facilities integrity and business availability.

      Read more >
    • Optimize Data Protection Costs and Defeat Malware for Data-Centric Organizations
      Optimize Data Protection Costs and Defeat Malware for Data-Centric Organizations Phil Goodwin, IDC Research Director of Storage Systems and Software Recorded: Apr 26 2018 4:00 pm UTC 47 mins
    • By 2020, IDC forecasts that 60 percent of organizations will have developed a digital transformation strategy and will be in the process of implementing it. As data becomes more valuable to organizations, it becomes an increasingly attractive target for theft or malware attack. These threats are becoming both more numerous and more frequent, challenging IT organizations to protect traditional data loss threats as well as cyber-threats.

      In this webinar led by IDC and the LTO Program, we will discuss key insights and analysis from IDC’s latest white paper Using Tape to Optimize Data Protection Costs and Defeat Malware for Data-Centric Organizations.

      Join us for highlights from this report, including:

      · The current and future state of the global datasphere
      · Future outlook for LTO technology and how it fits into the changing data landscape
      · Data protection best practices to safeguard against data loss threats and cyber-threats

      Read more >