Find out how a simple and free assessment can lead to IT Transformation. #GetModernRead more >
Richard Staton (Chair of Examiners for GCSE History) will take you through our key resources to help you plan, teach and assess our new GCSE History specification. In this 75 minute briefing, he'll cover the schemes of work, guidance on the Historic Environment, our guide to assessment and more.Read more >
ICTFOOTPRINT.eu is organising its 5th webinar on 27th April 2017, 12:00 CEST to help you manage the energy consumed by ICT and know how Life Cycle Assessment (LCA) can guide you to make your ICT more sustainable. All those who want to become more sustainable in ICT are welcome to join us in this exciting webinar.
Jean-Marc Alberola, Group Energy Strategy leader at Airbus & Vice Chairman of ETSI ISG OEU (Industry Specification Group Operational Energy Efficiency For Users). Jean-Marc will speak about the work developed by ETSI ISG-OEU, operative KPIs that enable the monitoring of the energy management performance in data centres and ICT sites. After a short description of the global KPI DCEM, the presentation will focus on the implementation of these KPI’s in an industrial area of corporate ICT sites.
Fadri Casty & Tereza Lévová, both from EcoInvent, , the world's most consistent & transparent Life Cycle Inventory database. The ecoinvent database provides well documented process data for thousands of products, helping you make truly informed decisions about their environmental impact. Fadri and Tereza will demonstrate the value of doing LCA on ICT equipment.
Berina Delalic, from multEE will introduce the Monitoring & Verification Platform (MVP), a web based tool developed to calculate and store data about energy and CO2 savings resulting from implemented energy efficiency measures. Having in mind central role of ICT especially in the commercial sector, some methods are developed for improving ICT’s energy efficiency, and therefore achieving CO2 emission reduction. The presentation will show how MVP can be used for measuring results from the activities that enable more efficient use of energy for ICT in commercial buildings.
The webinar will be moderated by Silvana Muscella (Project Coordinator of ICTFOOTPRINT.eu and CEO of Trust-IT Services) who has broad experience in stimulating topics in the ICT sector.
Flash-Speicher ist heutzutage aufgrund seiner Erschwinglichkeit, Flexibilität, Effizienz und Geschwindigkeit zur neuen Normalität geworden. Er ermöglicht eine bislang nicht gekannte Performance. EMC bietet ein gratis Assessment, das anhand Ihrer momentanen Unternehmens-IT herausfindet, ob Flash Speicher Ihre IT tatsächlich optimieren würde. Sehen Sie selbst, was All-Flash-Speicher für Ihr Unternehmen tun kann. Im Webinar treffen Sie auf unseren Experten, der Live demonstriert wie das Assessment funktioniertRead more >
Third-parties, partners and vendors with access to your networks and data make your organization vulnerable to breaches. Clearly, your business needs to work with third parties, but you don’t want your company to fall victim to data theft, brand damage, and possible government fines as a result, so you have to take third-party and vendor assessment very seriously.
With Qualys Security Assessment Questionnaire (SAQ) you can expand the scope of risk and compliance data beyond technical vulnerabilities to verify that third-party vendors are in compliance with emerging regulatory requirements. By automating a traditionally manual process, Qualys SAQ frees you from unreliable and labor-intensive approaches such as email and spreadsheets.
Join our complimentary webcast to learn how Qualys SAQ can help with:
* Third-Party risk assessment
* Internal Audit Management
* Security Training and Awareness
* End-to-End security compliance
This webcast includes a live demo and a Q&A.
Module 3 in the CSA STAR Series
While the Cloud Security Alliance’s (CSA) STAR Certification has certainly raised the bar for cloud providers, any audit is still a snapshot of a point in time. What goes on between audits can still be a blind spot.
To provide greater visibility, the CSA developed the Cloud Trust Protocol (CTP), an industry initiative which will enable real time monitoring of a CSP’s security properties, as well as providing continuous transparency of services and comparability between services on core security properties. This process is now being contributed to by BSI and other industry leaders.
CTP forms part of the Governance, Risk, and Compliance stack and the Open Certification Framework as the continuous monitoring component, complementing point-in-time assessments provided by STAR certification and STAR attestation.
Join us as we discuss:
The concepts behind different evolving approaches to continuous monitoring, the next step in increasing transparency in the cloud.
Open source software and code has become common place in application development, as have the use of vulnerability assessment tools. After all, no one wants to be the victim of the next Heartbleed, Poodle or Logjam. But vulnerability assessment tools, while helpful, have blind spots. How can you ensure that you are protecting your networks and applications from newly disclosed vulnerabilities? Join Black Duck Software and (ISC)2 on March 22nd, 2016 at 1:00PM Eastern for a discussion on VA Tools, Open Source Assets and secure application development.Read more >
You’ve invested in firewalls and endpoint protection. You’ve optimized and tweaked. Your content filters and AV are updated. Your email is locked down and you’re ready for whatever attackers might throw your way. Right? That’s what the targets of many of the recent headline-grabbing breaches would have said too.
Every organization can use an extra set of eyes – Audits should be a regular part of any security plan, but they can be expensive and time consuming. Enter the Fortinet Cyber Threat Assessment, a free evaluation of your existing security infrastructure that helps you:
•Evaluate potential security risks from the edge to the endpoint and everywhere in between
•Determine areas where security infrastructure is compromising performance and how to eliminate bottlenecks while still protecting your network
•Find often overlooked vulnerabilities and learn about risks both within and outside your organization.
Assessing your HR function can be a painful and time draining task... but it doesn’t have to be. You may spend countless hours focused on compliance and at the end of the day – what have you really learned? The key to a productive assessment is to outline meaningful goals and communicate your expected deliverables to leadership. The assessment process can be used to create internal relationships and move your HR career forward. Our customized process will align the assessment with your strategic goals allowing you to create meaningful new initiatives on the findings. Creation of action plans that address the concerns of top stakeholders is critical to a successful program, as is selling the initiatives within the organization.
Partcipants will walk away being able too…
*Understand the value of an HR assessment
*Align the assessment with organizational strategic plan
*Build internal bridges with other leaders in the organization
*Create action plans to ensure the assessment has internal value
*Deal with compliance issues uncovered during the assessment
Learn our 7 key steps to making the HR assessment a success and use it to enhace the HR leadership position within your own organization.
Our webinar has been specifically designed in response to the feedback that you’ve provided to us and the questions that our customer support team receive. Progressing through a new specification can be challenging so log in to our webinar to get the answers to your questions.Read more >
This year has brought profound changes to the security landscape, especially in the area of Distributed Denial of Service (DDoS) attacks. Aside from the traditional saturation objectives of such assaults, DDoS attacks are increasingly used as cyber “smokescreens” to mask more intrusive and more destructive penetration operations. Join Neustar and media leader, Cox Communications, in a forward-looking discussion on what you should consider to safeguard your business in 2015.
During this session, you’ll hear about:
• 2014 security trends and lessons
• 2015 DDoS threat assessments
• Real-world approaches to help keep you safe
Lee Smith (Dee Smith & Associates) and David Cuthbertson (SMS) will cover their approach and methods of assessing existing data centre facilities and management processes. Rapid changes in both IT and data centre technologies often mean that facilities and management techniques fail to evolve fast enough, with the data centre potentially being the weak link in the delivery chain of all IT services. Achieving a baseline through an assessment is critical for any improvement or transformation activity - but is not so easy to do in practice.Read more >
Cybersecurity awareness is growing as more organizations learn they are vulnerable to an attack. While compliance with regulatory and security audit requirements provides a starting point, it alone will not keep the organization safe. An effective security program needs to be multifaceted, integrating people, processes and technologies across all layers of the organization. The specifics vary due to industry, size and geographic presence, as well the level of risk the organization is willing to accept.
Mandiant Sr. Manager Tim Appleby will discuss the benefits of proactive preparedness and 10 key areas that should be considered in order to form a holistic security program, and discuss how priorities can vary based on industry, size and geography.
As usual, we'll leave plenty of time for Q&A.
Jared Pfost gives an overview of our Assessment Manager.Read more >
Bill Wildprett shows us how to conduct a HIPAA/HITECH risk assessment using Caliber Security's Security Process Management Suite (SPM).Read more >
With multiple mandates, constantly changing IT environments and a vast and evolving threat landscape—maintaining compliance requires measurable and enforceable controls. Now you can reduce risk and continuously comply with internal policies and external regulations.
Join us for this webcast to learn how a comprehensive and automated controls assessment can help you quickly and easily demonstrate due diligence about securing your IT assets through:
• System-hardening controls—selecting host and app settings to check for each policy
• Deep assessment—automatically scanning and analyzing your entire network
Today’s workforce embraces the idea that with mobile technology, we can work anywhere. Risk and compliance professionals are challenged to complete assessments that require location or site-specific information. Physical security, facility site and self-assessments require them to collect data and evidence while they are away from their desks, and organizations are turning to mobile to help them accomplish these tasks more efficiently.
During this webcast, you will learn how to develop and implement a mobile strategy for your GRC assessments to more efficiently capture risk and compliance assessment information on-site. By transforming time-consuming operational chores into efficient, value-added processes, you can significantly reduce potential data entry errors and delays in sharing this critical risk data.
Join us to learn more about:
• Considerations for determining what GRC use cases are best suited for the mobile environment
• How customers are utilizing RSA Archer GRC Mobile
• Using RSA Archer GRC Mobile to conduct audit, risk and compliance assessments via a product demonstration
Corporate data volumes are exploding exponentially, but legal budgets and court imposed deadlines are not keeping pace. It doesn't take Sherlock Holmes to recognize that reducing your time to knowledge can yield big dividends in cost containment and risk mitigation.
We can help you to see the bigger picture and better prepare for strategic project management, meaningful discovery negotiations, and informed proportionality arguments.
Our webinar will show you how you can use common investigative techniques to:
- Perform timeline and gap analysis
- Identify anomalies and trends
- Reduce the noise quickly and efficiently
- Find connections.
Demo of Cavirin's new platform that offers continuous security assessment and remediation on-premise and within the cloud. Cavirin offers the quickest time to baseline, OS hardening, and the most complete benchmark coverage.Read more >
Our buyer research in the Stop Selling & Start Leading® movement revealed specific behaviors that buyers want to see from sellers. In this webinar, I'll share what this means for needs assessment and how you can shift from old-school diagnostic to buyer-preferred dialogic assessments.Read more >