Richard Staton (Chair of Examiners for GCSE History) will take you through our key resources to help you plan, teach and assess our new GCSE History specification. In this 75 minute briefing, he'll cover the schemes of work, guidance on the Historic Environment, our guide to assessment and more.Read more >
Flash-Speicher ist heutzutage aufgrund seiner Erschwinglichkeit, Flexibilität, Effizienz und Geschwindigkeit zur neuen Normalität geworden. Er ermöglicht eine bislang nicht gekannte Performance. EMC bietet ein gratis Assessment, das anhand Ihrer momentanen Unternehmens-IT herausfindet, ob Flash Speicher Ihre IT tatsächlich optimieren würde. Sehen Sie selbst, was All-Flash-Speicher für Ihr Unternehmen tun kann. Im Webinar treffen Sie auf unseren Experten, der Live demonstriert wie das Assessment funktioniertRead more >
Third-parties, partners and vendors with access to your networks and data make your organization vulnerable to breaches. Clearly, your business needs to work with third parties, but you don’t want your company to fall victim to data theft, brand damage, and possible government fines as a result, so you have to take third-party and vendor assessment very seriously.
With Qualys Security Assessment Questionnaire (SAQ) you can expand the scope of risk and compliance data beyond technical vulnerabilities to verify that third-party vendors are in compliance with emerging regulatory requirements. By automating a traditionally manual process, Qualys SAQ frees you from unreliable and labor-intensive approaches such as email and spreadsheets.
Join our complimentary webcast to learn how Qualys SAQ can help with:
* Third-Party risk assessment
* Internal Audit Management
* Security Training and Awareness
* End-to-End security compliance
This webcast includes a live demo and a Q&A.
Module 3 in the CSA STAR Series
While the Cloud Security Alliance’s (CSA) STAR Certification has certainly raised the bar for cloud providers, any audit is still a snapshot of a point in time. What goes on between audits can still be a blind spot.
To provide greater visibility, the CSA developed the Cloud Trust Protocol (CTP), an industry initiative which will enable real time monitoring of a CSP’s security properties, as well as providing continuous transparency of services and comparability between services on core security properties. This process is now being contributed to by BSI and other industry leaders.
CTP forms part of the Governance, Risk, and Compliance stack and the Open Certification Framework as the continuous monitoring component, complementing point-in-time assessments provided by STAR certification and STAR attestation.
Join us as we discuss:
The concepts behind different evolving approaches to continuous monitoring, the next step in increasing transparency in the cloud.
Open source software and code has become common place in application development, as have the use of vulnerability assessment tools. After all, no one wants to be the victim of the next Heartbleed, Poodle or Logjam. But vulnerability assessment tools, while helpful, have blind spots. How can you ensure that you are protecting your networks and applications from newly disclosed vulnerabilities? Join Black Duck Software and (ISC)2 on March 22nd, 2016 at 1:00PM Eastern for a discussion on VA Tools, Open Source Assets and secure application development.Read more >
You’ve invested in firewalls and endpoint protection. You’ve optimized and tweaked. Your content filters and AV are updated. Your email is locked down and you’re ready for whatever attackers might throw your way. Right? That’s what the targets of many of the recent headline-grabbing breaches would have said too.
Every organization can use an extra set of eyes – Audits should be a regular part of any security plan, but they can be expensive and time consuming. Enter the Fortinet Cyber Threat Assessment, a free evaluation of your existing security infrastructure that helps you:
•Evaluate potential security risks from the edge to the endpoint and everywhere in between
•Determine areas where security infrastructure is compromising performance and how to eliminate bottlenecks while still protecting your network
•Find often overlooked vulnerabilities and learn about risks both within and outside your organization.
Assessing your HR function can be a painful and time draining task... but it doesn’t have to be. You may spend countless hours focused on compliance and at the end of the day – what have you really learned? The key to a productive assessment is to outline meaningful goals and communicate your expected deliverables to leadership. The assessment process can be used to create internal relationships and move your HR career forward. Our customized process will align the assessment with your strategic goals allowing you to create meaningful new initiatives on the findings. Creation of action plans that address the concerns of top stakeholders is critical to a successful program, as is selling the initiatives within the organization.
Partcipants will walk away being able too…
*Understand the value of an HR assessment
*Align the assessment with organizational strategic plan
*Build internal bridges with other leaders in the organization
*Create action plans to ensure the assessment has internal value
*Deal with compliance issues uncovered during the assessment
Learn our 7 key steps to making the HR assessment a success and use it to enhace the HR leadership position within your own organization.
Our webinar has been specifically designed in response to the feedback that you’ve provided to us and the questions that our customer support team receive. Progressing through a new specification can be challenging so log in to our webinar to get the answers to your questions.Read more >
This year has brought profound changes to the security landscape, especially in the area of Distributed Denial of Service (DDoS) attacks. Aside from the traditional saturation objectives of such assaults, DDoS attacks are increasingly used as cyber “smokescreens” to mask more intrusive and more destructive penetration operations. Join Neustar and media leader, Cox Communications, in a forward-looking discussion on what you should consider to safeguard your business in 2015.
During this session, you’ll hear about:
• 2014 security trends and lessons
• 2015 DDoS threat assessments
• Real-world approaches to help keep you safe
Lee Smith (Dee Smith & Associates) and David Cuthbertson (SMS) will cover their approach and methods of assessing existing data centre facilities and management processes. Rapid changes in both IT and data centre technologies often mean that facilities and management techniques fail to evolve fast enough, with the data centre potentially being the weak link in the delivery chain of all IT services. Achieving a baseline through an assessment is critical for any improvement or transformation activity - but is not so easy to do in practice.Read more >
Jared Pfost gives an overview of our Assessment Manager.Read more >
Cybersecurity awareness is growing as more organizations learn they are vulnerable to an attack. While compliance with regulatory and security audit requirements provides a starting point, it alone will not keep the organization safe. An effective security program needs to be multifaceted, integrating people, processes and technologies across all layers of the organization. The specifics vary due to industry, size and geographic presence, as well the level of risk the organization is willing to accept.
Mandiant Sr. Manager Tim Appleby will discuss the benefits of proactive preparedness and 10 key areas that should be considered in order to form a holistic security program, and discuss how priorities can vary based on industry, size and geography.
As usual, we'll leave plenty of time for Q&A.
Bill Wildprett shows us how to conduct a HIPAA/HITECH risk assessment using Caliber Security's Security Process Management Suite (SPM).Read more >
With multiple mandates, constantly changing IT environments and a vast and evolving threat landscape—maintaining compliance requires measurable and enforceable controls. Now you can reduce risk and continuously comply with internal policies and external regulations.
Join us for this webcast to learn how a comprehensive and automated controls assessment can help you quickly and easily demonstrate due diligence about securing your IT assets through:
• System-hardening controls—selecting host and app settings to check for each policy
• Deep assessment—automatically scanning and analyzing your entire network
Today’s workforce embraces the idea that with mobile technology, we can work anywhere. Risk and compliance professionals are challenged to complete assessments that require location or site-specific information. Physical security, facility site and self-assessments require them to collect data and evidence while they are away from their desks, and organizations are turning to mobile to help them accomplish these tasks more efficiently.
During this webcast, you will learn how to develop and implement a mobile strategy for your GRC assessments to more efficiently capture risk and compliance assessment information on-site. By transforming time-consuming operational chores into efficient, value-added processes, you can significantly reduce potential data entry errors and delays in sharing this critical risk data.
Join us to learn more about:
• Considerations for determining what GRC use cases are best suited for the mobile environment
• How customers are utilizing RSA Archer GRC Mobile
• Using RSA Archer GRC Mobile to conduct audit, risk and compliance assessments via a product demonstration
Corporate data volumes are exploding exponentially, but legal budgets and court imposed deadlines are not keeping pace. It doesn't take Sherlock Holmes to recognize that reducing your time to knowledge can yield big dividends in cost containment and risk mitigation.
We can help you to see the bigger picture and better prepare for strategic project management, meaningful discovery negotiations, and informed proportionality arguments.
Our webinar will show you how you can use common investigative techniques to:
- Perform timeline and gap analysis
- Identify anomalies and trends
- Reduce the noise quickly and efficiently
- Find connections.
Our buyer research in the Stop Selling & Start Leading® movement revealed specific behaviors that buyers want to see from sellers. In this webinar, I'll share what this means for needs assessment and how you can shift from old-school diagnostic to buyer-preferred dialogic assessments.Read more >
This webinar will review minimum EPA requirements and best practice for assessment and reporting on the integrity of retaining structures such as bunds (tank bunds, pallet bunds, bunded drum storage, etc..) and effluent pipelines and identify common areas where improvements can be made. The EPA would also welcome questions as part of this webinar and time will be allowed at the end of the webinar for this.Read more >
2016 is the Year of All Flash (#YOAF) and let us help you take next step towards the All Flash Datacenter: Flash Assessment.Read more >
Over the past 20 years, behavioural economics has identified factors that influence and determine how people behave, including alternative decision-making pathways and many cognitive biases and heuristics. Taking account of these helps to build a clear view of how healthcare customers think and behave in relation to your product in the real world.
This short masterclass explores ‘quantitative demand assessment research’ – what it is and how insights from behavioural economics can improve the application of this important tool in pharmaceutical market research.
The masterclass will:
•Introduce demand assessment research and why it is important to healthcare market research
•Discuss how insights from behavioural economics can improve quantitative demand assessment market research
•Highlight a range of techniques using behavioural economics that help you build a more accurate picture of your customers and market.