With its 25th May 2018 deadline, the General Data Protection Regulations have become the stuff that marketing dreams are made of, but the delivery of appropriate levels of confidentiality, integrity and availability for affected data does not have to mean vast amounts of investment in cutting edge technology and expensive consultancy engagements. In this session we will have a closer look at what the end results of Article 32 (Security of Processing) actually need to look like and address some of the terminology used so that delegates properly understand what the regulation demands from them and their businesses. In the context of business continuity, we will further look into how current strategies match up to GDPR and what can be done to optimise them for May 2018 and beyond.Read more >
As a follow-up to our previous webinar, this panel discussion will dive into further detail about the GDPR. Presented by compliance experts Lisa Bentall (DQM GRC) and Jason Hart (Gemalto) we will answer some of the big questions raised in the previous webinar and open up to the live audience for an interactive Q&A.Read more >
In this webinar, presented by compliance experts Christine Andrews (DQM GRC) and Jason Hart (Gemalto) you will learn:
a. The background to the new General Data Protection Regulation
b. An overview of the key areas of change from the existing Data Protection Act – and the penalties for getting it wrong
c. A focus on the information security implications and considerations for meeting compliance
d. An approach for understand the “Gaps” in your current compliance and, importantly, how best to move forwards
Join EDR and industry veteran Nick Albergo for an insider's take on:
-The types of issues courts consider during Phase I ESA-related lawsuits
-Practical challenges when addressing diffuse anthropogenic pollution
-Opinions versus recommendations
-When a file review can be deemed complete
-How EPs can avoid common pitfalls in their own practice
Nick Albergo's unique perspective is shaped by years of being called as an expert witness on Phase I litigation. In addition to being a course instructor for ASTM's E 1527-05 standard, Albergo has firsthand experience in the development of ASTM's Phase II ESA standard (E 1903). In this webinar, he will address recent revisions and the standard's place in the marketplace, as well as weigh in on such timely topics as vapor encroachment and continuing obligations under CERCLA.
Join us to learn how to construct factor-based multi-asset class strategies designed to deliver improved investment outcomes with less risk in a cost-efficient way.
•Identify appropriate strategic asset allocation
•Exploit market dislocations through tactical positioning
•Implement with proven risk factor combinations
We may now have reached a watershed in global central bank policy co-ordination. It remains to be seen whether the Federal Reserve will be able to leave interest rates at a level which, while appropriate for the global backdrop, may be increasingly inappropriate for the domestic US economy. In our latest webconference, Alan Cauberghs will explore whether the current uneasy truce between central banks and markets will persist and the implications for fixed income investors.Read more >
Today enterprises manage hundreds of virtual machines that need to be protected. With Dell EMC Avamar Dynamic Policies you can easily keep up with the growth of your VMware environments and ensure the appropriate policies are automatically assigned to any VM with certain attributes or tags. Join our live webinar presented by Daniel Olkowski, Solution Engineer Dell EMC Data Protection Solutions to learn how to make your life easier with fully automated VM’s backup.Read more >
How an organisation operates doesn't happen by magic!. It happens by DESIGN. As an organisation grows, previous ways of working become less appropriate and new alternatives become fashionable.
In part 3 of this series, we discuss the challenges organisations face and how a Target Operating Model aids communication and minimises effort an organisation needs to formulate a working model.
Enforcement of the EU General Data Protection Regulation (GDPR) will begin on May 25, 2018. It effects and applies to all companies processing and holding the personal data of individuals residing in the European Union, regardless of the company’s location. The law was passed in 2016 and we are presently in a “transition period” which, by some accounts, has been ignored or unrecognized by many organizations. If your organization handles personal data for residents of the EU now is the time to prepare.
During this webinar you will learn about the regulation’s requirements and penalties. Further, the information offered will help you update or create appropriate audit/risk assessments to determine your organization’s readiness.
This session describes what are the various levels of governance that most companies are implementing (Corporate, IT and Architecture), the different frameworks that may be considered, what an Enterprise Architecture is and how a framework such as TOGAF 9 can help. Then how do we use Enterprise Architecture to address cloud computing initiatives, what are the pros and the cons.Read more >
While digital transformation has led manufacturers to incorporate sensors and software analytics into their offerings, the same innovation has also brought pressure to offer clients more accommodating appliance deployment options. Case studies and other examples will show how to select the appropriate appliance architecture.Read more >
This webcast will provide corporate leaders a roadmap for bridging the hierarchical gaps between management and employees to gain company-wide acceptance of transformative strategic initiatives. Serial entrepreneur Hayes Drumwright will demonstrate how to take responsibility for uncovering and fusing the inspiration potential at all levels of your organization and neutralizing the culture of fear and apathy that corrodes the team and organizational commitments of your employees.
• How to better implement change in today’s over-complicated, over-structured enterprise
• Inspire the enterprise employee base to work with the same passion as the founders and executive team toward corporate success
• Traverse the often confusing array of new social media tools in order to better understand which tool is appropriate to which situation without creating more social noise
• Ensure a 70% success rate for new initiatives instead of the current 70% failure rate critical to corporate productivity, profitability, and viability
Security automation strategies are a necessity for any cloud-scale enterprise. There are challenges to be met at each phase of developing and deploying security automation including identifying the appropriate automation goals, creating an accurate view of the organization, tool selection, and managing the returned data at scale. This presentation will provide the details of various of open-source materials and methods that can be used to address each of those challenges.
About the speaker:
Peleus Uhley has been a part of the security industry for more than 15 years. As the Lead Security Strategist at Adobe, he assists the company with proactive and reactive security. Prior to joining Adobe, Peleus was a senior developer at Anonymizer, and a security consultant for @stake and Symantec.
Data and security breaches related to cloud services and apps were much more widely reported in 2016. The increased use of cloud-based business applications has allowed organisations to maximize the productivity and efficiency benefits that are part and parcel of cloud architectures.
With access to data no longer as restricted as it once was, risks naturally increase. Denial of access is not an option. Instead, the goal is to allow appropriate access and prevent bad outcomes (i.e. data breaches) from arising.
In this session, find out how to mitigate the risks by:
- Improving visibility of Shadow IT, without compromising productivity
- Protecting your employees from inadvertently exposing your company to advanced threats
- Securing your network and your employees anywhere, any time
A mixed-reality world driven by intelligent systems would have to be observing behavior and sensing physical phenomena continuously in order to provide individuals with appropriate content. Is that a sensible trade-off or a dance with the devil?
Does the sensing possible with these technologies allow for ways to level the playing field or does it exacerbate existing power inequities? If the AI-enabled world of the future is monetized with personal data, then surveillance might well be baked into the system, but the ethical issues we see today will only be amplified in an immersive environment.
Join this discussion with Monique Morrow, CTO & Chief Technology Strategist, President & Co-Founder of the Humanized Internet, for an in-depth look at what a true MR/AR/VR world means.
In the first webinar of the series we covered the importance of caching in microservice-based application architectures—in addition to improving performance it also aids in making content available from legacy systems, promotes loose coupling and team autonomy, and provides air gaps that can limit failures from cascading through a system.
To reap these benefits, though, the right caching patterns must be employed. In this webinar, we will examine various caching patterns and shed light on how they deliver the capabilities needed by our microservices. What about rapidly changing data, and concurrent updates to data? What impact do these and other factors have to various use cases and patterns?
Understanding data access patterns, covered in this webinar, will help you make the right decisions for each use case. We will examine patterns including look-aside cache, inline cache, and systems of record and discuss the most appropriate use cases for each.
Beyond the simplest of use cases, caching can be tricky business—join us for this webinar to see how best to use them.
New solid state storage technologies are forcing the industry to refine distinctions between networks and other types of system interconnects. The question on everyone’s mind is, when is it beneficial to use networks to access solid state storage, particularly persistent memory? The answer to this question involves application, interconnect, memory technology and scalability factors that can be analyzed in the context of a latency budget. In this talk we will explore latency budgets for various types of solid state storage access. These can be used to determine which combinations of interconnects, technologies and scales are compatible with Load/Store instruction access and which are better suited to IO completion techniques such as polling or blocking. In this webcast you’ll learn:
•Why latency is important in accessing solid state storage
•How to determine the appropriate use of networking in the context of a latency budget
•Do’s and don’ts for Load/Store access