Today’s researchers are obliged to include a variety of metrics in their applications for grant funding, and promotion and tenure files. They also develop online profiles to enhance their reputation and attract collaborators. Whether welcome or worrisome, researcher profiles and metrics have become commonplace. So how can librarians help?
It begins with a conversation. Discover how to put researchers at ease with the notion of metrics, and what metrics can and cannot convey. Find out more about how to select the best metrics for different disciplines and at different stages of the research career. And learn how institutional initiatives, such as instituting the ORCID researcher iD and providing early education, can provide them with lifelong benefits. By helping to clarify and codify certain processes, you will ensure your researchers are their own best advocates.
- Clearing up misconceptions about bibliometric indicators
- Metrics as a means to counterbalance other biases
- Telling researchers’ stories through metrics
- Metrics for different disciplines and career stages
- Promoting ORCID at various points in the researchers’ career
- Touchpoints for researcher training
Join us for the first webinar in the Wiley Learn to Publish series and learn all you need to know to publish your next article with confidence. Learn from and interact with top editors in the research community during the live Q&A sessions and connect with other researchers in the BrightTalk community.
Register for the first FREE webinar now and you’ll receive guidance from expert editors on:
•Selecting the RIGHT journal – How to choose the best outlet for your research
•Preparing your article – How to follow author guidelines
•Creating a title and abstract- How to communicate your research effectively
Future webinars will include 'Peer Review and Publishing Ethics- the dos and don'ts' and 'Sharing and Promoting your Research- SEO and Altmetrics'.
Attend all three webinars to receive your free ‘Get Published’ eBook and course completion certificate.
Wiley is pleased to present an Introduction to Publishing for Early Career Researchers in India.
If you’re just starting out in your Research career then this webinar is for you… We will talk you through the writing and publishing processes using local and relevant examples, and providing you with helpful hints and tips
Our experienced Editors will cover the following topics:
-So you’re thinking of writing a paper? Find out how and where to begin the writing process, and how to choose the right journal.
-How to write? We’ll guide you through what editors are looking for and how to tailor your writing to it.
-The publishing and peer review processes. Everything you need to know about the publishing process including time lines.
-Your paper has published, what next? Learn how to increase the exposure of your paper.
Chair – Graham Woodward, Associate Marketing Director, Author Marketing
Andrew Moore, Editor-in-Chief, BioEssays
Anne Nijs, Deputy Editor, European Journal of Organic Chemistry
This webinar will leave you feeling confident about publishing your research papers with Wiley.
Elsevier’s Pure gives your faculty and their research global exposure through the Pure Portal. The Portal hosts searchable, open web profiles that make it easy for industry representatives and researchers from other institutions to quickly locate and connect with potential collaborators among your faculty.
Join us on September 7th to learn more about the Pure Portal, including practical examples of how Oregon Health & Science University uses it to promote their faculty's expertise on a global scale.
This webinar will explore how librarians are supporting researchers in applied and discipline-specific areas. Presenters will include three chemistry professionals, two who have gone into library sciences supporting fellow researchers and one who has pursued a distinguished research career in chemistry. They will examine whether researchers' needs vary with their involvement in applied versus basic research, and examine the impact on the librarian's skill set and tools. Other key themes include how important is it for a librarian to have an educational background in the disciplines they support, and how do they stay up-to-date in their field?Read more >
Does your company employ foreign scientists or researchers coming to the United States? This webinar will discuss immigration options and what an employer needs to know when sponsoring scientists and researchers for U.S. visas.
Topics will include:
1.Common Temporary Visa Options
2.Paths to Permanent Residence and their Advantages and Limitations
3.Pitfalls and Real-World Considerations for Employers
Authors and researchers around the world have let us know through survey feedback and one-on-one interviews that time management is a common concern. In recognition of this concern, we would like to invite you to a free webinar on November 13, 2014 featuring time management expert Joan Capua.
As the Manager for Learning and Development at Wiley, Joan will be applying time management techniques learned from her 20 years of experience in training professionals in multiple industries to feedback from authors and researchers.
In this 1-hour session, Joan will provide:
• An introduction to the latest research on time management
• Step-by-step application of a professional time management tool to examples of real author concerns and stressors
• A strategy for the best way to trim down your “To-Do” list and prevent burn-out
• Tips on preventing distraction and an analysis of the real costs of distraction
• Feedback on your comments and questions as submitted during the session
Peer review is a great opportunity for early career researchers to play a greater role in the research community and gain valuable experience to help improve your own research writing. If you’d like to get involved in peer review, or are looking for tips on how to deliver a great review, join our webinar for top advice from our team of experts.
We will cover the following:
- Why peer review matters: Why peer review is important, your responsibilities as a peer reviewer, and why you should get involved.
- The Editors’ perspective: Find out how editors choose reviewers, what editors expect from peer review, and how your review is used to inform editorial decisions.
- How to write a great peer review: Learn how to provide a top quality evaluation that is useful for the authors in improving their manuscript, and editors in making their decisions.
- The ethics of peer review: We’ll guide you through your ethical obligations as a reviewer, and the main pitfalls to watch out for.
• Chair: Verity Warne, Author Marketing, Wiley
• Michael Willis, Senior Manager Peer Review, Wiley and ISMTE president Elect
• J. Matthias Starck, Editor, Journal of Morphology
• Paul Trevorrow, Executive Journals Editor, Wiley
• Dr John Langley, University of Southampton
• Emily Jesper, Sense About Science
Connect your published works to a global audience effectively in this webinar, where you will learn best practices, strategies & tips around:
•Enhancing article discoverability
•Wiley author marketing solutions
•Measuring & Increasing the Altmetric Score
•Telling a story with both metrics
•Practical Uses of Altmetric
Veteran threat researcher Keith Gilbert sits down for an interview on threat intelligence in hunting. Watch to learn about:
-How to convert data into actionable threat intel
-Best techniques for leveraging threat intel on a hunt
-Tips and best practices from Keith's threat hunting career
Over the last few months, dedicated security researchers at Imperva Incapsula have witnessed the emergence of a new DDoS assault pattern, which we have come to call a “pulse wave” attack. Join Avishay Zawoznik, Lead Threat Researcher, and Kim Lambert, Incapsula Product and Security Evangelist, as they explore the rationale behind this type of attack, the consequences it can have for your network, and what you should do to make sure your organization is adequately protected.Read more >
Eyal Neemany—security researcher at Javelin Networks—breaks down his most recent project: the Honeypot Buster. He walks you through the motivation of building the tool and its features. You will even see a live demo!Read more >
Each quarter, our expert threat researchers from FortiGuard Labs analyse data from millions of sensors around the globe to identify the most current and dangerous threats, and dissect how and why they are succeeding.
Join this webinar for a first-hand look at this past quarter's findings, plus actionable steps to help you avoid these pitfalls. Learn more about these top takeaways that include:
•Insight into the Equifax breach; Apache and other exploit trends
•Evidence mobile malware is on the rise and how to stop it
•A list of vulnerabilities attacked, by frequency so you can prioritize patching
Join us for our live publishing clinic and learn all you need to know to publish your next article with confidence. Learn from and interact with top editors in the research community during the live Q&A sessions and connect with other researchers in the BrightTalk community.
Register for our FREE webinar now and you’ll receive guidance from expert editors on:
•Selecting the RIGHT journal – How to choose the best outlet for your research
•Preparing your article – How to follow author guidelines
•Peer Review/Rejection – How to address reviewer comments and prepare for resubmission
•Post publication and SEO – How to promote your work
It’s easy to preach the value of sourcing, but it’s difficult to prioritize regularly. Why spend hours reaching out to passive candidates - who may never reply - when you can just respond to candidates who are actively looking?
Because proactive sourcing is key to filling your high-priority, hard-to-fill roles. Since Shopify zeroed in on proactive outreach three years ago, their growth has been explosive. They’ve skyrocketed from 550 to over 2,000 employees and made 387 hires through proactive sourcing, including 110 hard-to-fill roles.
What’s more? They've doubled their candidate response rate to cold outreach from 21 to 42 percent since rolling out Lever Nurture.
Want to know the secrets behind their unprecedented success? On October 10th, Recruiting Researcher Jess Verbruggen will share the outreach tactics that actually pique the interest of candidates, and ultimately lead to monumental growth.
Join us to learn:
- Why Shopify knew they had to prioritize proactive sourcing in the first place
- How they advocated to build a team of recruiting researchers who specialize in sourcing
- Concrete steps to increase your response rate to cold outreach
- The direct link between sourcing and massively scaling your team
In recent years, we have seen large-scale botnets used to execute attacks rarely seen in the past -- botnets that incorporate new features and bigger capabilities than ever before. How and why some of these botnets remain resilient is a question that needs to be answered, and one of the reasons is Fast Flux. Fast Flux is a DNS technique used by botnets to hide various types of malicious activities (such as phishing, web proxying, malware delivery, and malware communication) behind an ever-changing network of compromised hosts acting as proxies. In general, a Fast Flux network is mostly used to make communication between malware and its command and control server (C&C) more resistant to discovery. Akamai’s high visibility to both Web and Enterprise traffic enables new and unique insights on the behavior of such Fast Flux networks.
In this webinar, you will get an in-depth analysis on:
- How network fluxing is using domains, IP addresses and even nameservers to become resistant to discovery
- How Fast Flux networks offer services such as malware communication and hosting of malicious content
- How botnets are used both for Fast Flux communications and a variety of Web attacks such as Web scraping and credential abuse
- Best practices for detecting and defending against such botnets
Join Akamai and (ISC)² on Nov 22 (Wed) at 13:00 (Singapore time) / 16:00 (Sydney time) to learn more about the Fast Flux Botnet.
Presenter: Or Katz, Principal Lead Security Researcher, Akamai
Moderator: Ir. Tejinder Singh, Senior Development Expert, T-Systems Malaysia SGA Security Engineering
On May 3rd, over a million Gmail users granted a fake, but convincing, application full access to their emails and contacts. Two weeks later, a major ransomware attack spread rapidly and affected a multitude of organizations across the world. Needless to say, it’s been a busy month in the infosec world.
Now that the dust has started to settle, join our security researchers Alex Chiu, threat researcher for Cisco Talos, and Brad Antoniewicz, security researcher for Cisco Umbrella, as they take you through the details of the recent attacks.
In the session, our researchers will share:
- Key findings from their research
- Details uncovered about the attackers’ infrastructure, including analysis of the malware, domains, and IPs used in the attack
- How Cisco identified and blocked the attacks, including a timeline of events
- Steps you can take to protect your organization
We’ll also look ahead at how these types of attacks could potentially evolve over time and how you can better prepare.
Windows Management Instrumentation (WMI) is a Microsoft Windows administrative tool that has access to all system resources, making it powerful for both legitimate and illegitimate use. Via WMI you can do things like execute, delete and copy files; change registry values; and identify which security products are installed to aid in bypassing them.
The malicious use of WMI and other legitimate tools continues to grow and was identified as a top trend in a recent SecureWorks Threat Intelligence Executive Report. Like PowerShell, WMI is often used to create file-less attacks that are difficult to identify and stop with technology alone. This makes WMI the perfect tool for threat actors to use as camouflage while acting inside your organisation.
Join Counter Threat Unit - Special Operations Researcher, Lee Lawson, for the second webcast in our two-part series on how threat actors are exploiting Windows tools in “living off the land” attacks.
You will learn:
- Why WMI is so risky
- Tips to identify malicious use of WMI
- How threat actors hide their tracks and how you can unmask them
- WMI threats identified by SecureWorks researchers
- How you can avoid becoming a victim to this growing threat vector
In a recent SecureWorks engagement, 98.5% of the 3,477 commands executed by threat actors were native to the Windows operating system.
PowerShell is a popular tool that Microsoft has been including with the Windows OS since 2009, but malicious PowerShell use is rivalling ransomware in popularity with threat actors. Security products focused on preventing endpoint threats are often not enough to differentiate legitimate from malicious PowerShell use.
In the first webcast of a two-part series on how threat actors are exploiting Windows tools in “living off the land” attacks, SecureWorks Counter Threat Unit - Special Operations Researcher, Lee Lawson, will discuss why PowerShell is so risky, how SecureWorks researchers identify PowerShell threats, and how you can defend your organisation.
You Will Learn:
- What PowerShell is and how it is used in “living off the land” attacks
- Why built-in tools like PowerShell are so attractive to threat actors
- Examples of malicious PowerShell use
- How to defend your organisation against common methods threat actors use to evade prevention and detection
Credential abuse attacks have become a prevalent threat in recent years, and a successful credential abuse attack campaign can result in damaging consequences such as losing access and control over the accounts, data breach and fraudulent transactions.
Many of the accounts being abused are compromised account, which are the result of information breach in vulnerable web applications. The problem starts once visitors of highly-secured web applications create login credentials and then recycle those credentials to access another potentially vulnerable web application.
In this webinar, Akamai will present our latest research on malicious activity that sheds new light on credential abuse attack campaigns characteristics. The research reveals the techniques that are being used and what make these campaigns difficult to detect over long periods of time. We will show how collaboration of attack evidence on different targets can become a solution to mitigate such attacks.
The speakers will also share key attack data and trends observed from the latest Akamai Q2 2017 State of the Internet Security Report.
Join Akamai and (ISC)² on Aug 30 (Wed) at 13:00 (Singapore time) to learn more about improving credential abuse threat mitigation.
- Or Katz, Principal Lead Security Researcher, Akamai
- James Tin, Principal Enterprise Security Architect, Akamai
- Clayton Jones, Managing Director, APAC, (ISC)²
Earlier this year, RiskIQ reported an eightfold increase in internet scam incidents, which deny the $83 billion digital advertising industry millions of dollars. Since then, we’ve identified a particularly prolific threat actor that’s built out wide swaths of infrastructure to deliver millions of scam ads, threatening consumers and undermining the digital advertising industry.
Based on the RiskIQ report released in April, NoTrove: The Threat Actor Ruling a Scam Empire, report author and RiskIQ Threat Researcher Ian Cowger and Technical Marketing Manager Benjamin Powell will walk you through how “NoTrove,” a scam actor named after its URI pattern and penchant for denying victims “troves” of rewards, uses its scam empire and advanced automation techniques to stay ahead of detection and takedown efforts.
Watch the Threatcast™ for a deep dive on:
How scams are becoming a lucrative and increasingly popular method for threat actors and why they’re bad news for the digital advertising ecosystem
What the different variants of NoTrove campaigns look like—software downloads, PUP redirections, and fake rewards downloads—and what the redirection sequence looks like when victims click and are redirected to unwanted places across the internet
How NoTrove domains are able to command so much traffic, many shoot well up into the Alexa top 10,000
How RiskIQ’s unique machine learning technology is able to detect scams, even as threat actor tactics evolve, to enable ad networks and publishers to block NoTrove infrastructure, even as it changes, evolves, and rotates
SecureWorks Counter Threat Unit™ (CTU) researchers will discuss details of the “NotPetya” Ransomware attack. Our experts will discuss this and similar attacks, help organizations explain the importance of avoiding malicious attempts and discuss the value of recommended mitigation tactics.
In this webcast we will discuss:
• History and timeline of this attack and how it began
• What is this ransomware, how is it different from others and how it operates
• Why this is not Petya or Goldeneye
• How to be vigilant of misinformation
• SecureWorks recommended actions to protect yourself
• Interactive Q&A session
The security of the Internet of Things has long been debated, with researchers showing the vulnerability of virtually any device to hacking. This year, cyber criminals and targeted attacks have regularly used "Things" to infiltrate, exfiltrate, and attack: Metasploit modules for light bulbs and DDoS attacks from web cameras (Mirai) are two examples. This presentation will provide unique insight into professional attack campaigns leveraging the IoT.Read more >
Cyber attacks don't just happen. You need an attacker who is motivated, has infrastructure, seeks resourcing and performs reconnaissance. And all this happens before the attack. Ironically, most security vendors focus on blocking or identifying activity at the point of attack. But what if you could identify attacks during development, during the hacker supply chain?
Clear and effective visibility into the attack chain would give security teams a dramatic ability to predict attacks, girding before the attack even begins. In this webinar, security researcher Ido Wulkan will help you understand where to look, what to look for and how to do it.
About the Presenter:
Ido has a decade of experience in intelligence research and analysis, focusing on the deep and dark web. Ido served in one of the leading intelligence units of the Israeli Defense Force (IDF) as a cyber intelligence analyst, where he gained intimate knowledge of various threat actors and their techniques. Following his service, Ido worked at several intelligence firms as an analyst and team leader, where he expanded his knowledge of cybercrime ecosystems. Ido now leads IntSights’ cyber intelligence analysts team, where he serves as a focal point for all IntSights’ intelligence.
Fifty-two percent of security leaders rate their organizations at above average or superior when it comes to detecting or blocking ransomware before it locks or encrypts data in their systems. Yet, 36 percent also say their organizations were victims of ransomware in the past year. And 57 percent say they are more likely to be a ransomware target in 2017.
These are among the results of the 2017 Ransomware Defense Survey. Aimed at determining the true impact of ransomware on organizations across industries, the survey uncovers some stark contrasts.
ISMG Vice President of Editorial, Tom Field and SecureWorks Senior Security Researcher, Keith Jarvis, will analyze the Ransomware Defense Survey results and will discuss how security leaders can put these findings to work in their organizations.
You Will Learn About:
• The true impact of ransomware on organizations across industries
• What works and doesn't work when it comes to detecting and remediating ransomware
• Key investments enterprises are making in 2017 to shore up their ransomware defenses
• How to prevent and detect ransomware before it takes root and cripples your operations