Hi [[ session.user.profile.firstName ]]
Sort by:
    • Developing an Assessment Strategy in the Human Age
      Developing an Assessment Strategy in the Human Age Christine Corbet & Steve Towers, Principal Consultants, Right Management Recorded: Jun 29 2017 5:00 pm UTC 60 mins
    • Lunch+Learn Series

      Assessments play a critical role in identifying and developing the talent needed to survive in today’s rapidly changing environment, but the landscape of assessment providers is growing exponentially – with corresponding risks. Making sense of these changes is difficult for even the most savvy HR teams.

      + Do gamified tools provide additional benefits?
      + Should we throw out tried and true best practices in favor of newer assessment concepts?
      + How can investments in assessment be made wisely – providing rigor while also maintaining employee engagement?

      Cutting through the noise in this complex environment requires an evaluation of your assessment options.

      Join us as we share research and best practices regarding:

      + The state of talent management assessments today
      + Tying assessment to strategic business objectives
      + Building an enterprise-wide assessment strategy
      + Ensuring stakeholders understand how and when to deploy assessments

      Read more >
    • Streamlining Third Party Risk Assessments in the Cloud
      Streamlining Third Party Risk Assessments in the Cloud Jonathan Osmolski, Enterprise Records & Information Governance, Pekin Insurance & Hariom Singh, Product Management Qualys Recorded: Jun 20 2017 6:00 pm UTC 59 mins
    • Security assessments drastically reduce your organization’s risk of suffering a data breach by identifying poor InfoSec and privacy practices among vendors, partners, contractors, and other third parties.

      For most businesses, these assessments are a slow, unscalable, manual process that strains InfoSec teams and creates a backlog of security evaluations.

      During this webcast, Jonathan Osmolski, Manager of Enterprise Records and Information Governance at Pekin Insurance, and Hariom Singh, Director of Product Management for Qualys Security Assessment Questionnaire (SAQ) will show you how you can free your organization from unreliable and labor-intensive manual processes, and optimize the accuracy of audit results.

      You will learn how Pekin Insurance:

      > Replicated its manual 76-question assessment process within SAQ’s web-based UI in just two hours
      > Simplified the design, distribution, tracking, and analysis of multiple vendor risk assessment campaigns
      > Gained improved visibility into its compliance performance metrics
      Increased the overall productivity and efficiency of its InfoSec team

      This webcast will include a live demo and Q&A session.

      Read more >
    • Solutions for Energy Management and Life Cycle Assessment (LCA) in the ICT field
      Solutions for Energy Management and Life Cycle Assessment (LCA) in the ICT field Jean-Marc Alberola, Fadri Casty & Tereza Lévová, Berina Delalic Recorded: Apr 27 2017 10:00 am UTC 61 mins
    • ICTFOOTPRINT.eu is organising its 5th webinar on 27th April 2017, 12:00 CEST to help you manage the energy consumed by ICT and know how Life Cycle Assessment (LCA) can guide you to make your ICT more sustainable. All those who want to become more sustainable in ICT are welcome to join us in this exciting webinar.

      Jean-Marc Alberola, Group Energy Strategy leader at Airbus & Vice Chairman of ETSI ISG OEU (Industry Specification Group Operational Energy Efficiency For Users). Jean-Marc will speak about the work developed by ETSI ISG-OEU, operative KPIs that enable the monitoring of the energy management performance in data centres and ICT sites. After a short description of the global KPI DCEM, the presentation will focus on the implementation of these KPI’s in an industrial area of corporate ICT sites.

      Fadri Casty & Tereza Lévová, both from EcoInvent, , the world's most consistent & transparent Life Cycle Inventory database. The ecoinvent database provides well documented process data for thousands of products, helping you make truly informed decisions about their environmental impact. Fadri and Tereza will demonstrate the value of doing LCA on ICT equipment.

      Berina Delalic, from multEE will introduce the Monitoring & Verification Platform (MVP), a web based tool developed to calculate and store data about energy and CO2 savings resulting from implemented energy efficiency measures. Having in mind central role of ICT especially in the commercial sector, some methods are developed for improving ICT’s energy efficiency, and therefore achieving CO2 emission reduction. The presentation will show how MVP can be used for measuring results from the activities that enable more efficient use of energy for ICT in commercial buildings.

      The webinar will be moderated by Silvana Muscella (Project Coordinator of ICTFOOTPRINT.eu and CEO of Trust-IT Services) who has broad experience in stimulating topics in the ICT sector.

      Read more >
    • Online Live Demo: das Flash Assessment
      Online Live Demo: das Flash Assessment Martin Stengel Recorded: Sep 29 2016 8:00 am UTC 35 mins
    • Flash-Speicher ist heutzutage aufgrund seiner Erschwinglichkeit, Flexibilität, Effizienz und Geschwindigkeit zur neuen Normalität geworden. Er ermöglicht eine bislang nicht gekannte Performance. EMC bietet ein gratis Assessment, das anhand Ihrer momentanen Unternehmens-IT herausfindet, ob Flash Speicher Ihre IT tatsächlich optimieren würde. Sehen Sie selbst, was All-Flash-Speicher für Ihr Unternehmen tun kann. Im Webinar treffen Sie auf unseren Experten, der Live demonstriert wie das Assessment funktioniert

      Read more >
    • Excel at Your Security Assessments Without EXCEL Spreadsheets
      Excel at Your Security Assessments Without EXCEL Spreadsheets Tim White, Director of Product Management, Qualys and Hariom Singh, Subject Matter Expert, Qualys Recorded: Sep 13 2016 6:00 pm UTC 61 mins
    • Third-parties, partners and vendors with access to your networks and data make your organization vulnerable to breaches. Clearly, your business needs to work with third parties, but you don’t want your company to fall victim to data theft, brand damage, and possible government fines as a result, so you have to take third-party and vendor assessment very seriously.

      With Qualys Security Assessment Questionnaire (SAQ) you can expand the scope of risk and compliance data beyond technical vulnerabilities to verify that third-party vendors are in compliance with emerging regulatory requirements. By automating a traditionally manual process, Qualys SAQ frees you from unreliable and labor-intensive approaches such as email and spreadsheets.

      Join our complimentary webcast to learn how Qualys SAQ can help with:

      * Third-Party risk assessment
      * Internal Audit Management
      * Security Training and Awareness
      * End-to-End security compliance

      This webcast includes a live demo and a Q&A.

      Read more >
    • Continuous auditing/assessment of relevant security properties
      Continuous auditing/assessment of relevant security properties John DiMaria of BSI Recorded: Jun 14 2016 4:00 pm UTC 44 mins
    • Module 3 in the CSA STAR Series

      While the Cloud Security Alliance’s (CSA) STAR Certification has certainly raised the bar for cloud providers, any audit is still a snapshot of a point in time. What goes on between audits can still be a blind spot.
      To provide greater visibility, the CSA developed the Cloud Trust Protocol (CTP), an industry initiative which will enable real time monitoring of a CSP’s security properties, as well as providing continuous transparency of services and comparability between services on core security properties[1]. This process is now being contributed to by BSI and other industry leaders.

      CTP forms part of the Governance, Risk, and Compliance stack and the Open Certification Framework as the continuous monitoring component, complementing point-in-time assessments provided by STAR certification and STAR attestation.

      Join us as we discuss:
      The concepts behind different evolving approaches to continuous monitoring, the next step in increasing transparency in the cloud.

      Read more >
    • Fortinet's Cyber Threat Assessment - For Once, Get What You Don't Pay For
      Fortinet's Cyber Threat Assessment - For Once, Get What You Don't Pay For Neil Matz, Sr. Product Marketing Manager, Fortinet Recorded: Sep 16 2015 6:00 pm UTC 34 mins
    • You’ve invested in firewalls and endpoint protection. You’ve optimized and tweaked. Your content filters and AV are updated. Your email is locked down and you’re ready for whatever attackers might throw your way. Right? That’s what the targets of many of the recent headline-grabbing breaches would have said too.

      Every organization can use an extra set of eyes – Audits should be a regular part of any security plan, but they can be expensive and time consuming. Enter the Fortinet Cyber Threat Assessment, a free evaluation of your existing security infrastructure that helps you:
      •Evaluate potential security risks from the edge to the endpoint and everywhere in between
      •Determine areas where security infrastructure is compromising performance and how to eliminate bottlenecks while still protecting your network
      •Find often overlooked vulnerabilities and learn about risks both within and outside your organization.

      Read more >
    • HR Assessments For Success
      HR Assessments For Success Lori Kleiman Author and Managing Facilitator, HR Topics Recorded: Mar 25 2015 2:40 pm UTC 55 mins
    • Assessing your HR function can be a painful and time draining task... but it doesn’t have to be. You may spend countless hours focused on compliance and at the end of the day – what have you really learned? The key to a productive assessment is to outline meaningful goals and communicate your expected deliverables to leadership. The assessment process can be used to create internal relationships and move your HR career forward. Our customized process will align the assessment with your strategic goals allowing you to create meaningful new initiatives on the findings. Creation of action plans that address the concerns of top stakeholders is critical to a successful program, as is selling the initiatives within the organization.

      Partcipants will walk away being able too…

      *Understand the value of an HR assessment
      *Align the assessment with organizational strategic plan
      *Build internal bridges with other leaders in the organization
      *Create action plans to ensure the assessment has internal value
      *Deal with compliance issues uncovered during the assessment

      Learn our 7 key steps to making the HR assessment a success and use it to enhace the HR leadership position within your own organization.

      Read more >
    • 10 Components for Proactive Cyber Security
      10 Components for Proactive Cyber Security Tim Appleby, Sr. Manager, Security Program Assessments, Mandiant Consulting. Recorded: Oct 26 2016 6:00 pm UTC 59 mins
    • Cybersecurity awareness is growing as more organizations learn they are vulnerable to an attack. While compliance with regulatory and security audit requirements provides a starting point, it alone will not keep the organization safe. An effective security program needs to be multifaceted, integrating people, processes and technologies across all layers of the organization. The specifics vary due to industry, size and geographic presence, as well the level of risk the organization is willing to accept.

      Mandiant Sr. Manager Tim Appleby will discuss the benefits of proactive preparedness and 10 key areas that should be considered in order to form a holistic security program, and discuss how priorities can vary based on industry, size and geography.

      As usual, we'll leave plenty of time for Q&A.

      Read more >
    • Mobile Assessments for Your GRC Program: Anytime, Anywhere
      Mobile Assessments for Your GRC Program: Anytime, Anywhere Mason Karrer, GRC Strategist, RSA Recorded: Mar 27 2014 3:00 pm UTC 58 mins
    • Today’s workforce embraces the idea that with mobile technology, we can work anywhere. Risk and compliance professionals are challenged to complete assessments that require location or site-specific information. Physical security, facility site and self-assessments require them to collect data and evidence while they are away from their desks, and organizations are turning to mobile to help them accomplish these tasks more efficiently.

      During this webcast, you will learn how to develop and implement a mobile strategy for your GRC assessments to more efficiently capture risk and compliance assessment information on-site. By transforming time-consuming operational chores into efficient, value-added processes, you can significantly reduce potential data entry errors and delays in sharing this critical risk data.

      Join us to learn more about:
      • Considerations for determining what GRC use cases are best suited for the mobile environment
      • How customers are utilizing RSA Archer GRC Mobile
      • Using RSA Archer GRC Mobile to conduct audit, risk and compliance assessments via a product demonstration

      Read more >
    • GDPR Privacy Impact and Risk Assessments
      GDPR Privacy Impact and Risk Assessments Ariel Evans, CEO, InnoSec Recorded: Aug 17 2017 12:00 pm UTC 49 mins
    • - InnoSec is the winner of the EU commission Horizon 2020 grant based on its innovation in GDPR and cyber risk -

      GDPR is an urgent issue that has companies scrambling to be compliant by May of 2018. Any organization that processes EU citizen data is in scope and the penalties are severe.

      Alignment with the requirements can reduce the chances of triggering a Data Protection Authority (DPA) to investigate a company’s privacy practices after the GDPR takes effect in May 2018. DPAs can impose a fine on companies of up to 4% of annual global revenues for egregious violations of the GDPR. Member states can also add to these fines. The Netherlands, for instance, has more than doubled its own fining capacity to 10% of annual revenues. European privacy advocates are pressuring DPAs to fully exercise these new powers after May 2018.To manage this risk, multinationals should have a means to demonstrate alignment with the GDPR requirements and communication of this program with DPAs that have jurisdiction over their major European operations.

      InnoSec’s GDPR solution provides privacy impact and risk assessments which measure the confidentiality and integrity of the system and the risk associated to it meeting articles 1,2, 5, 32, 35 and 36. Additionally, we provide a readiness gap analysis for managing, planning and budgeting for GDPR.

      Most e-commerce, educational and multi-national organizations process EU citizen data and are in scope for GDPR. Moreover, most organizations are not ready according to Gartner and his means the race to the finish line requires as much automation as you can afford. InnoSec provides a means for companies to save money and time with their GDPR assessment and gap analysis offering.. Our GDPR offering automates the assessment process and provides a gap analysis readiness feature, that also ensures that organizations can plan, budget and manage their GDPR program.

      Come to this webinar to see how it is done.

      Read more >