Hi [[ session.user.profile.firstName ]]
Sort by:
    • Interpreting the GDPR's Article 32 in the most appropriate way for YOUR business
      Interpreting the GDPR's Article 32 in the most appropriate way for YOUR business Nick Burrows (Daisy Group) Recorded: May 18 2017 9:30 am UTC 53 mins
    • With its 25th May 2018 deadline, the General Data Protection Regulations have become the stuff that marketing dreams are made of, but the delivery of appropriate levels of confidentiality, integrity and availability for affected data does not have to mean vast amounts of investment in cutting edge technology and expensive consultancy engagements. In this session we will have a closer look at what the end results of Article 32 (Security of Processing) actually need to look like and address some of the terminology used so that delegates properly understand what the regulation demands from them and their businesses. In the context of business continuity, we will further look into how current strategies match up to GDPR and what can be done to optimise them for May 2018 and beyond.

      Read more >
    • Phase I ESA Liability Protection: Beyond All Appropriate Inquiry
      Phase I ESA Liability Protection: Beyond All Appropriate Inquiry Nick Albergo Recorded: Jan 31 2012 7:00 pm UTC 60 mins
    • Join EDR and industry veteran Nick Albergo for an insider's take on:

      -The types of issues courts consider during Phase I ESA-related lawsuits
      -Practical challenges when addressing diffuse anthropogenic pollution
      -Opinions versus recommendations
      -When a file review can be deemed complete
      -How EPs can avoid common pitfalls in their own practice

      Nick Albergo's unique perspective is shaped by years of being called as an expert witness on Phase I litigation. In addition to being a course instructor for ASTM's E 1527-05 standard, Albergo has firsthand experience in the development of ASTM's Phase II ESA standard (E 1903). In this webinar, he will address recent revisions and the standard's place in the marketplace, as well as weigh in on such timely topics as vapor encroachment and continuing obligations under CERCLA.

      Read more >
    • Creating an Information Governance Project Plan
      Creating an Information Governance Project Plan Kathryn Hilton, VP, Contoural Recorded: May 5 2017 4:35 pm UTC 69 mins
    • Many organizations are looking to upgrade their paper-centric records management program to better manage electronic information by incorporating records compliance, eDiscovery, privacy as well as employee productivity and launching an information governance program. Yet often the most difficult part these programs is getting started. Deciding what to do, in what order, how much and how quickly often determines the success of the entire project. Jumping into a project with an incomplete and ill-fitting plan can cause a program to stall out or even fail. On the other hand, a complete, well-designed information governance program project plan with appropriate milestones and metrics can drive a successful program forward. This webinar explores key elements for launching an information governance program and how to incorporate these elements into a roadmap that meets your organization’s specific needs. Join Contoural Vice President Kathryn Hilton as she covers:

      • Assessing your current state and determining appropriate target states. This will include a discussion of current information-governance-related frameworks, appropriate metrics as well as building a program business case.
      • Key program elements including Policy Development, Data Mapping, Data Placement Strategies, Technology Evaluation and Behavior Change Management Strategies.
      • Pulling all of these elements together into a successful roadmap

      Read more >
    • Architecting for SQL Server Performance
      Architecting for SQL Server Performance Matt Henderson, Director of Microsoft Technology at Vexata Upcoming: Oct 19 2017 5:00 pm UTC 45 mins
    • Successful analytics and transactional systems start with proper architectural principles and considerations. This webinar will be a detailed walk through of all the software and hardware infrastructure below the database server. It will explain how each layer affects database workloads as well as give tools and metrics for determining optimal architectural configurations.

      From this webinar you will learn:

      • How to design SQL server infrastructures for optimal performance
      • How the software and hardware infrastructure affect database performance
      • Tools and metrics to determine appropriate hardware allocations. For example, how many CPU cores, data volumes, tempdb files or GBs of memory are needed for your workload.
      • Tools and metrics to find current bottlenecks, inside and outside of the database server
      • Tools and best practices for monitoring all layers

      Read more >
    • Practical Tips for a Successful First TAR Project
      Practical Tips for a Successful First TAR Project George Socha, Kelly Atherton, and Sam Merritt Recorded: Aug 8 2017 6:00 pm UTC 63 mins
    • Technology Assisted Review (TAR) has been judicially approved for use in appropriate cases for several years now and is a powerful tool to maximize efficiency, accuracy, and savings in document review, legal investigations, and beyond. Yet most corporate legal departments and law firms are not utilizing this tool. What is holding them back? In this webinar sponsored by NightOwl Discovery, learn from industry experts about low-risk use cases for your first predictive coding project and practical tips from the trenches on what has (and has not) worked to educate and prepare the legal team to use TAR (or predictive coding), to set up the project and deadlines, and to effectively train the system to most efficiently categorize and rank documents.

      Read more >
    • Tame the Beast: Rapidly Build, Deploy, Reuse, and Govern Microservices
      Tame the Beast: Rapidly Build, Deploy, Reuse, and Govern Microservices Kamala Dasika, Pivotal, Sandeep Singh Kohli, Mulesoft and Jesus De Oliveira, Mulesoft Recorded: Sep 19 2017 6:00 pm UTC 52 mins
    • Microservice architectures enable development teams to bring new features and updates to market faster. But enterprises adopting microservices also experience common challenges like service redundancy, duplication, and not being able to connect to existing databases and SaaS tools easily. With an increasing number of services across the organization, visibility and governance become even more critical for IT.

      In this webinar, we will cover how Pivotal and Mulesoft are addressing these challenges with a modern application development and operations environment so that application developers can remain focused on generating value for customers, and operators can deploy, monitor, and scale their apps faster.

      Topics include how you can:

      * Rapidly build and deliver scalable, resilient microservices and applications implementing distributed system patterns

      * Easily catalogue, discover, and consume your microservices

      * Quickly connect your microservices to legacy or SaaS applications

      * Analyze API metrics and manage appropriate policies to govern interaction patterns across the services/APIs landscape

      Read more >
    • Managing Information Overload with a Pragmatic Global Content Strategy
      Managing Information Overload with a Pragmatic Global Content Strategy Rebecca Ray, Common Sense Advisory Recorded: Sep 19 2017 3:00 pm UTC 54 mins
    • The World Wide Web has, in many respects, leveled the playing field—making it possible for businesses of any size to develop an international following. But, building an multinational presence means ensuring your content is global-ready.

      Join me, Scott Abel, The Content Wrangler, and my special guest, senior analyst Rebecca Ray of Common Sense Advisory, as we discuss how to develop and use marketing personas, customer journey maps, categorization, and content tiering as the building blocks for a pragmatic global content strategy.

      Attendees will learn how to apply domestic market discipline to global rollouts, steps to follow when creating a practical strategy, and the importance of validating domestic marketing profiles to ensure they are appropriate for global use. You'll also learn how customer journey maps, auditing and categorizing of content for local markets, and establishing content tiering criteria based on hard data can help you be successful.

      Read more >
    • Pharma and proactive, preventative healthcare: how to use the pharmacy channel
      Pharma and proactive, preventative healthcare: how to use the pharmacy channel Andrew McConaghie (moderator), John Munson, Nemanja Jankovic and Nina Felton Recorded: Sep 6 2017 1:00 pm UTC 70 mins
    • Across Europe, a shift towards greater prevention, earlier diagnosis and treatment is needed in order to contain the growing cost of healthcare.
      But how can healthcare systems make this transition – and how do pharmaceutical companies play a role in this, while also growing their market?
      A forthcoming webinar hosted by pharmaphorum with sponsor PHOENIX group looks at how harnessing the data and expertise of pharmacies, and via greater engagement with patients, consumers and shoppers can meet this emerging need.
      •Industry: how can pharma switch from treating a disease to earlier health management?
      The role of preventative medicine, vaccines and early diagnosis explored
      •The role of community pharmacies in prevention and health – increasing screening and diagnosis rates and facilitating appropriate medication
      •How point of sale information in pharmacies can help generate a picture of patient groups and individuals. How loyalty card schemes support OTC and consumer spending patterns, which illuminate health needs, prescription patterns and purchasing behaviour

      Read more >
    • Executive Cyber Protection
      Executive Cyber Protection Chris Bullock, SecureWorks Managing Principal Recorded: Aug 29 2017 6:00 pm UTC 48 mins
    • In a world where physical attack vectors are no longer the preferred way to attack a person of notoriety or a chief executive sta¬tus individual, the need for cyber executive protection to enhance existing cybersecurity programs and traditional executive protection has become greater than ever. With expanded use of information sharing through social media and use of technologies such as home automation, Executive’s habits, families and close personnel staff are being monitored, targeted and shared via the dark web for a number of reasons such as disruption of business, personal or brand embarrassment and financial gain just to name a few.

      In this webcast, Chris Bullock, SecureWorks Managing Principal, will cover a new approach to mitigating risk to this emerging threat that encompasses:

      • Analyzing ten domains of risk to an Executive, their family and close staff
      • How to assess potential risk and exposure to the brand or reputational damage
      • Guidance on which specific risk factors to monitor regularly to ensure preparedness
      • How to implement the most effective and appropriate safeguards

      Read more >