Hi [[ session.user.profile.firstName ]]
Sort by:
    • Researcher profiles and metrics that matter
      Researcher profiles and metrics that matter Chris Belter, NIH Library; Ellen Cole, Northumbria University; Andrea Michalek, Plum Analytics Recorded: Jun 8 2017 3:00 pm UTC 62 mins
    • Today’s researchers are obliged to include a variety of metrics in their applications for grant funding, and promotion and tenure files. They also develop online profiles to enhance their reputation and attract collaborators. Whether welcome or worrisome, researcher profiles and metrics have become commonplace. So how can librarians help?

      It begins with a conversation. Discover how to put researchers at ease with the notion of metrics, and what metrics can and cannot convey. Find out more about how to select the best metrics for different disciplines and at different stages of the research career. And learn how institutional initiatives, such as instituting the ORCID researcher iD and providing early education, can provide them with lifelong benefits. By helping to clarify and codify certain processes, you will ensure your researchers are their own best advocates.

      TOPICS

      - Clearing up misconceptions about bibliometric indicators
      - Metrics as a means to counterbalance other biases
      - Telling researchers’ stories through metrics
      - Metrics for different disciplines and career stages
      - Promoting ORCID at various points in the researchers’ career
      - Touchpoints for researcher training

      Read more >
    • Introduction to Publishing for Early Career Researchers in India
      Introduction to Publishing for Early Career Researchers in India Graham Woodward, Assoc Marketing Director, Author Marketing; Andrew Moore, EiC, BioEssays; Anne Nijs, Deputy Editor, EurJOC Recorded: Apr 21 2016 9:00 am UTC 62 mins
    • Wiley is pleased to present an Introduction to Publishing for Early Career Researchers in India.

      If you’re just starting out in your Research career then this webinar is for you… We will talk you through the writing and publishing processes using local and relevant examples, and providing you with helpful hints and tips

      Our experienced Editors will cover the following topics:
      -So you’re thinking of writing a paper? Find out how and where to begin the writing process, and how to choose the right journal.
      -How to write? We’ll guide you through what editors are looking for and how to tailor your writing to it.
      -The publishing and peer review processes. Everything you need to know about the publishing process including time lines.
      -Your paper has published, what next? Learn how to increase the exposure of your paper.

      The Speakers:
      Chair – Graham Woodward, Associate Marketing Director, Author Marketing
      Andrew Moore, Editor-in-Chief, BioEssays
      Anne Nijs, Deputy Editor, European Journal of Organic Chemistry

      This webinar will leave you feeling confident about publishing your research papers with Wiley.

      Read more >
    • Time Management for Authors and Researchers
      Time Management for Authors and Researchers Joan Capua, Training and Development Manager, Wiley. Recorded: Nov 13 2014 3:00 pm UTC 53 mins
    • Authors and researchers around the world have let us know through survey feedback and one-on-one interviews that time management is a common concern. In recognition of this concern, we would like to invite you to a free webinar on November 13, 2014 featuring time management expert Joan Capua.

      As the Manager for Learning and Development at Wiley, Joan will be applying time management techniques learned from her 20 years of experience in training professionals in multiple industries to feedback from authors and researchers.

      In this 1-hour session, Joan will provide:

      • An introduction to the latest research on time management
      • Step-by-step application of a professional time management tool to examples of real author concerns and stressors
      • A strategy for the best way to trim down your “To-Do” list and prevent burn-out
      • Tips on preventing distraction and an analysis of the real costs of distraction
      • Feedback on your comments and questions as submitted during the session

      Read more >
    • Getting peer review right: A guide for early career researchers
      Getting peer review right: A guide for early career researchers Verity Warne, Wiley; Michael Willis, Wiley; J. Matthias Starck; Paul Trevorrow, Wiley; Dr John Langley; Emily Jesper. Recorded: Dec 10 2014 3:00 pm UTC 64 mins
    • Peer review is a great opportunity for early career researchers to play a greater role in the research community and gain valuable experience to help improve your own research writing. If you’d like to get involved in peer review, or are looking for tips on how to deliver a great review, join our webinar for top advice from our team of experts.

      We will cover the following:

      - Why peer review matters: Why peer review is important, your responsibilities as a peer reviewer, and why you should get involved.

      - The Editors’ perspective: Find out how editors choose reviewers, what editors expect from peer review, and how your review is used to inform editorial decisions.

      - How to write a great peer review: Learn how to provide a top quality evaluation that is useful for the authors in improving their manuscript, and editors in making their decisions.

      - The ethics of peer review: We’ll guide you through your ethical obligations as a reviewer, and the main pitfalls to watch out for.

      The Speakers
      • Chair: Verity Warne, Author Marketing, Wiley
      • Michael Willis, Senior Manager Peer Review, Wiley and ISMTE president Elect
      • J. Matthias Starck, Editor, Journal of Morphology
      • Paul Trevorrow, Executive Journals Editor, Wiley
      • Dr John Langley, University of Southampton
      • Emily Jesper, Sense About Science

      Read more >
    • Publishing Clinic for Early Career Researchers in Egypt
      Publishing Clinic for Early Career Researchers in Egypt Dr Andrew Moore and Dr Aly Youssef Recorded: Oct 5 2017 4:00 pm UTC 71 mins
    • Join us for our live publishing clinic and learn all you need to know to publish your next article with confidence. Learn from and interact with top editors in the research community during the live Q&A sessions and connect with other researchers in the BrightTalk community.

      Register for our FREE webinar now and you’ll receive guidance from expert editors on:
      •Selecting the RIGHT journal – How to choose the best outlet for your research
      •Preparing your article – How to follow author guidelines
      •Peer Review/Rejection – How to address reviewer comments and prepare for resubmission
      •Post publication and SEO – How to promote your work

      Read more >
    • Why Proactive Recruiting is Key to Filling Your High Priority Roles
      Why Proactive Recruiting is Key to Filling Your High Priority Roles Jess Verbruggen, Recruiting Researcher at Shopify Recorded: Oct 10 2017 7:00 pm UTC 47 mins
    • It’s easy to preach the value of sourcing, but it’s difficult to prioritize regularly. Why spend hours reaching out to passive candidates - who may never reply - when you can just respond to candidates who are actively looking?

      Because proactive sourcing is key to filling your high-priority, hard-to-fill roles. Since Shopify zeroed in on proactive outreach three years ago, their growth has been explosive. They’ve skyrocketed from 550 to over 2,000 employees and made 387 hires through proactive sourcing, including 110 hard-to-fill roles.

      What’s more? They've doubled their candidate response rate to cold outreach from 21 to 42 percent since rolling out Lever Nurture.

      Want to know the secrets behind their unprecedented success? On October 10th, Recruiting Researcher Jess Verbruggen will share the outreach tactics that actually pique the interest of candidates, and ultimately lead to monumental growth.

      Join us to learn:
      - Why Shopify knew they had to prioritize proactive sourcing in the first place
      - How they advocated to build a team of recruiting researchers who specialize in sourcing
      - Concrete steps to increase your response rate to cold outreach
      - The direct link between sourcing and massively scaling your team

      Read more >
    • In-Depth Analysis of a Fast Flux Botnet
      In-Depth Analysis of a Fast Flux Botnet Or Katz, Principal Lead Security Researcher, Akamai Recorded: Nov 22 2017 5:00 am UTC 60 mins
    • In recent years, we have seen large-scale botnets used to execute attacks rarely seen in the past -- botnets that incorporate new features and bigger capabilities than ever before. How and why some of these botnets remain resilient is a question that needs to be answered, and one of the reasons is Fast Flux. Fast Flux is a DNS technique used by botnets to hide various types of malicious activities (such as phishing, web proxying, malware delivery, and malware communication) behind an ever-changing network of compromised hosts acting as proxies. In general, a Fast Flux network is mostly used to make communication between malware and its command and control server (C&C) more resistant to discovery. Akamai’s high visibility to both Web and Enterprise traffic enables new and unique insights on the behavior of such Fast Flux networks.

      In this webinar, you will get an in-depth analysis on:

      - How network fluxing is using domains, IP addresses and even nameservers to become resistant to discovery
      - How Fast Flux networks offer services such as malware communication and hosting of malicious content
      - How botnets are used both for Fast Flux communications and a variety of Web attacks such as Web scraping and credential abuse
      - Best practices for detecting and defending against such botnets

      Join Akamai and (ISC)² on Nov 22 (Wed) at 13:00 (Singapore time) / 16:00 (Sydney time) to learn more about the Fast Flux Botnet.

      Presenter: Or Katz, Principal Lead Security Researcher, Akamai
      Moderator: Ir. Tejinder Singh, Senior Development Expert, T-Systems Malaysia SGA Security Engineering

      Read more >
    • Anatomy of the attacks: WannaCry ransomware & Google OAuth phishing
      Anatomy of the attacks: WannaCry ransomware & Google OAuth phishing Alex Chiu, threat researcher for Cisco Talos, and Brad Antoniewicz, security researcher for Cisco Umbrella Recorded: Jun 12 2017 4:00 pm UTC 53 mins
    • On May 3rd, over a million Gmail users granted a fake, but convincing, application full access to their emails and contacts. Two weeks later, a major ransomware attack spread rapidly and affected a multitude of organizations across the world. Needless to say, it’s been a busy month in the infosec world.

      Now that the dust has started to settle, join our security researchers Alex Chiu, threat researcher for Cisco Talos, and Brad Antoniewicz, security researcher for Cisco Umbrella, as they take you through the details of the recent attacks.

      In the session, our researchers will share:

      - Key findings from their research

      - Details uncovered about the attackers’ infrastructure, including analysis of the malware, domains, and IPs used in the attack

      - How Cisco identified and blocked the attacks, including a timeline of events

      - Steps you can take to protect your organization

      We’ll also look ahead at how these types of attacks could potentially evolve over time and how you can better prepare.

      Read more >
    • How Hackers Exploit Your Windows Tools, Part 2: The WMI Threat
      How Hackers Exploit Your Windows Tools, Part 2: The WMI Threat Lee Lawson, Special Operations Researcher, SecureWorks Counter Threat Unit Recorded: Sep 13 2017 1:00 pm UTC 51 mins
    • Windows Management Instrumentation (WMI) is a Microsoft Windows administrative tool that has access to all system resources, making it powerful for both legitimate and illegitimate use. Via WMI you can do things like execute, delete and copy files; change registry values; and identify which security products are installed to aid in bypassing them.

      The malicious use of WMI and other legitimate tools continues to grow and was identified as a top trend in a recent SecureWorks Threat Intelligence Executive Report. Like PowerShell, WMI is often used to create file-less attacks that are difficult to identify and stop with technology alone. This makes WMI the perfect tool for threat actors to use as camouflage while acting inside your organisation.

      Join Counter Threat Unit - Special Operations Researcher, Lee Lawson, for the second webcast in our two-part series on how threat actors are exploiting Windows tools in “living off the land” attacks.

      You will learn:

      - Why WMI is so risky
      - Tips to identify malicious use of WMI
      - How threat actors hide their tracks and how you can unmask them
      - WMI threats identified by SecureWorks researchers
      - How you can avoid becoming a victim to this growing threat vector

      Read more >
    • How Hackers Exploit Your Windows Tools, Part 1: The PowerShell Risk
      How Hackers Exploit Your Windows Tools, Part 1: The PowerShell Risk Lee Lawson, Special Operations Researcher, SecureWorks Counter Threat Unit Recorded: Aug 24 2017 1:00 pm UTC 49 mins
    • In a recent SecureWorks engagement, 98.5% of the 3,477 commands executed by threat actors were native to the Windows operating system.

      PowerShell is a popular tool that Microsoft has been including with the Windows OS since 2009, but malicious PowerShell use is rivalling ransomware in popularity with threat actors. Security products focused on preventing endpoint threats are often not enough to differentiate legitimate from malicious PowerShell use.

      In the first webcast of a two-part series on how threat actors are exploiting Windows tools in “living off the land” attacks, SecureWorks Counter Threat Unit - Special Operations Researcher, Lee Lawson, will discuss why PowerShell is so risky, how SecureWorks researchers identify PowerShell threats, and how you can defend your organisation.

      You Will Learn:

      - What PowerShell is and how it is used in “living off the land” attacks
      - Why built-in tools like PowerShell are so attractive to threat actors
      - Examples of malicious PowerShell use
      - How to defend your organisation against common methods threat actors use to evade prevention and detection

      Read more >
    • Improving Credential Abuse Threat Mitigation
      Improving Credential Abuse Threat Mitigation Or Katz, Principal Lead Security Researcher, Akamai & James Tin, Principal Enterprise Security Architect, Akamai Recorded: Aug 30 2017 5:00 am UTC 58 mins
    • Credential abuse attacks have become a prevalent threat in recent years, and a successful credential abuse attack campaign can result in damaging consequences such as losing access and control over the accounts, data breach and fraudulent transactions.

      Many of the accounts being abused are compromised account, which are the result of information breach in vulnerable web applications. The problem starts once visitors of highly-secured web applications create login credentials and then recycle those credentials to access another potentially vulnerable web application.

      In this webinar, Akamai will present our latest research on malicious activity that sheds new light on credential abuse attack campaigns characteristics. The research reveals the techniques that are being used and what make these campaigns difficult to detect over long periods of time. We will show how collaboration of attack evidence on different targets can become a solution to mitigate such attacks.

      The speakers will also share key attack data and trends observed from the latest Akamai Q2 2017 State of the Internet Security Report.

      Join Akamai and (ISC)² on Aug 30 (Wed) at 13:00 (Singapore time) to learn more about improving credential abuse threat mitigation.

      Presenters:
      - Or Katz, Principal Lead Security Researcher, Akamai
      - James Tin, Principal Enterprise Security Architect, Akamai

      Moderator:
      - Clayton Jones, Managing Director, APAC, (ISC)²

      Read more >
    • NoTrove: A Deep Dive into a Scam Empire
      NoTrove: A Deep Dive into a Scam Empire Ian Cowger, Threat Researcher, RiskIQ Recorded: Aug 24 2017 2:15 pm UTC 37 mins
    • Earlier this year, RiskIQ reported an eightfold increase in internet scam incidents, which deny the $83 billion digital advertising industry millions of dollars. Since then, we’ve identified a particularly prolific threat actor that’s built out wide swaths of infrastructure to deliver millions of scam ads, threatening consumers and undermining the digital advertising industry.

      Based on the RiskIQ report released in April, NoTrove: The Threat Actor Ruling a Scam Empire, report author and RiskIQ Threat Researcher Ian Cowger and Technical Marketing Manager Benjamin Powell will walk you through how “NoTrove,” a scam actor named after its URI pattern and penchant for denying victims “troves” of rewards, uses its scam empire and advanced automation techniques to stay ahead of detection and takedown efforts.

      Watch the Threatcast™ for a deep dive on:

      How scams are becoming a lucrative and increasingly popular method for threat actors and why they’re bad news for the digital advertising ecosystem
      What the different variants of NoTrove campaigns look like—software downloads, PUP redirections, and fake rewards downloads—and what the redirection sequence looks like when victims click and are redirected to unwanted places across the internet
      How NoTrove domains are able to command so much traffic, many shoot well up into the Alexa top 10,000
      How RiskIQ’s unique machine learning technology is able to detect scams, even as threat actor tactics evolve, to enable ad networks and publishers to block NoTrove infrastructure, even as it changes, evolves, and rotates

      Read more >
    • Using the Hacker Supply Chain to Get Ahead of the Attack [Threat Hunting Series]
      Using the Hacker Supply Chain to Get Ahead of the Attack [Threat Hunting Series] Ido Wulkan, Security Researcher and Intelligence Team Lead at IntSights Recorded: Jun 6 2017 6:00 pm UTC 42 mins
    • Cyber attacks don't just happen. You need an attacker who is motivated, has infrastructure, seeks resourcing and performs reconnaissance. And all this happens before the attack. Ironically, most security vendors focus on blocking or identifying activity at the point of attack. But what if you could identify attacks during development, during the hacker supply chain?

      Clear and effective visibility into the attack chain would give security teams a dramatic ability to predict attacks, girding before the attack even begins. In this webinar, security researcher Ido Wulkan will help you understand where to look, what to look for and how to do it.

      About the Presenter:
      Ido has a decade of experience in intelligence research and analysis, focusing on the deep and dark web. Ido served in one of the leading intelligence units of the Israeli Defense Force (IDF) as a cyber intelligence analyst, where he gained intimate knowledge of various threat actors and their techniques. Following his service, Ido worked at several intelligence firms as an analyst and team leader, where he expanded his knowledge of cybercrime ecosystems. Ido now leads IntSights’ cyber intelligence analysts team, where he serves as a focal point for all IntSights’ intelligence.

      Read more >
    • 2017 Ransomware Defense Survey Report: The Enterprise Strikes Back
      2017 Ransomware Defense Survey Report: The Enterprise Strikes Back Keith Jarvis, Senior Security Researcher Recorded: Apr 18 2017 5:40 pm UTC 42 mins
    • Fifty-two percent of security leaders rate their organizations at above average or superior when it comes to detecting or blocking ransomware before it locks or encrypts data in their systems. Yet, 36 percent also say their organizations were victims of ransomware in the past year. And 57 percent say they are more likely to be a ransomware target in 2017.

      These are among the results of the 2017 Ransomware Defense Survey. Aimed at determining the true impact of ransomware on organizations across industries, the survey uncovers some stark contrasts.

      ISMG Vice President of Editorial, Tom Field and SecureWorks Senior Security Researcher, Keith Jarvis, will analyze the Ransomware Defense Survey results and will discuss how security leaders can put these findings to work in their organizations.

      You Will Learn About:
      • The true impact of ransomware on organizations across industries
      • What works and doesn't work when it comes to detecting and remediating ransomware
      • Key investments enterprises are making in 2017 to shore up their ransomware defenses
      • How to prevent and detect ransomware before it takes root and cripples your operations

      Read more >