Hi [[ session.user.profile.firstName ]]
Sort by:
    • Smart Beta & Low Carbon
      Smart Beta & Low Carbon Eric Shirbini, Global Product Specialist with ERI Scientific Beta; Moderator, Brendan Maton Recorded: Jun 21 2016 2:00 pm UTC 70 mins
    • EDHEC Risk Institute has been conducting research for several years on the possibility of reconciling financial and environmental performance. The launch of a new series of low carbon indices by ERI Scientific Beta, the smart beta index provider set up by EDHEC Risk Institute in 2012, marks the practical realisation of these research efforts and represents an important moment for responsible finance, because the results of the research undertaken will provide institutional investors with smart beta indices that can reduce the carbon footprint of their equity investments by more than 80%, while at the same time outperforming traditional market indices and being able to create more than 50% additional value in the medium term.
       
      EDHEC Risk Institute's approach can be distinguished from numerous approaches that, over the long term, hope to outperform the stock markets through the higher returns of shares in firms that have a better carbon footprint, because these firms are supposedly less affected by the increasing cost of fossil fuels and the tons of carbon emitted, but that, in the short and medium term, aim to produce performance that is fairly similar to that of traditional stock market indices.
       
      •Topics covered include:
      •The limits of green stock picking
      •How to perform financially whilst reducing the carbon footprint
      •Presentation of Scientific Beta Low Carbon Multi-Beta Multi-Strategy Indices

      Read more >
    • Next generation carbon capture technologies for coal
      Next generation carbon capture technologies for coal Toby Lockwood Recorded: Apr 27 2016 11:00 am UTC 38 mins
    • Established CO2 capture technologies such as absorption with amine solvents are associated with significant energetic and economic penalties, reducing power plant efficiency by around 10% points and increasing the cost of electricity production by up to 80%. Dedicated research programmes worldwide have pursued the development of a wide range of innovative, alternative technologies for CO2 capture, largely by addressing the fundamental gas separation step at the heart of post-combustion, pre-combustion or oxyfuel combustion processes. Novel solvents with lower energy requirements than conventional amines, using phase change systems, ionic liquids, enzyme-activation, or non-aqueous solvents, are promising approaches for post-combustion capture. Alternatively, techniques used in other commercial gas separations, including solid sorbents, membranes, and cryogenic separation, have also been developed for carbon capture through extensive materials research and process optimisation. Whilst challenging for post-combustion capture applications, these techniques may be of particular benefit to pre-combustion capture systems where much higher partial pressures of CO2 are available, and integration of the CO2 capture step and water gas shift reaction can be achieved using sorbents or membranes. In oxyfuel combustion, membranes are also an option for efficient oxygen production, but pressurised combustion systems have demonstrated the most potential for efficiency improvements, potentially in combination with novel power cycles which are better-suited to exploiting the altered combustion conditions. Finally, chemical looping combustion is a unique approach to carbon capture which can achieve dramatic energy savings through its inherent avoidance of any gas separation step, and is undergoing significant scale up. This webinar will review these developments in novel capture technologies and highlight the most promising strategies for achieving major cost reductions.

      Read more >
    • Managing Climate Risk with Low Carbon Indexes
      Managing Climate Risk with Low Carbon Indexes Brendan Maton Recorded: Jun 8 2015 2:00 pm UTC 67 mins
    • As the global economy copes with the unpredictable challenges of climate change, institutional investors are exploring the potential impact of these changes on financial assets. With recent announcements by the Financial Stability Board in Basel and the Bank of England to examine the risks posed by ‘Stranded Assets’, more investors are calculating their exposure to high carbon assets and looking for ways to diversify into low or no carbon alternatives.

      There are a growing number of options available to institutional investors. Some Asset Owners have announced plans to divest from high carbon assets, while others have looked to low carbon indexes which either exclude or reweight exposure to carbon-intensive companies while limiting short-term risk against the benchmark.
We invite you to join a discussion with leading experts to examine the extent to which asset owners feel they are exposed to climate risk; the role of asset managers to encourage good practice when addressing climate change and carbon risk and how asset managers can effectively implement a low carbon strategy through index funds.

      Read more >
    • Detecting Network Threats: What Can Endpoint Data Tell You?
      Detecting Network Threats: What Can Endpoint Data Tell You? Greg Foss, Security Architect, LogRhythm & Chris Berninger, Senior Systems Engineer, Carbon Black Upcoming: May 24 2017 12:00 am UTC 60 mins
    • Data-driven security is the future, but alarm fatigue and data overload continue to hold Security Operations teams back. Fortunately, there are some easy ways to organize and correlate data so you can simplify the threat hunting process and free up your resources to better detect, respond and neutralize advanced threats.

      In this webcast, Greg Foss, Security Architect at LogRhythm, and Chris Berninger, Senior Systems Engineer at Carbon Black, discuss how to proactively search for and detect threats in your network.

      You’ll learn:

      • To use endpoint data to gain visibility into your network and understand what’s really going on in your network
      • How LogRhythm SmartResponse can help orchestrate security operations
      • Threat hunting techniques using Carbon Black within LogRhythm

      Register now to discover how to use insights from endpoint data to best protect your organization from advanced attacks.

      Read more >
    • Detecting Network Threats: What Can Endpoint Data Tell You?
      Detecting Network Threats: What Can Endpoint Data Tell You? Greg Foss, Security Architect, LogRhythm & Chris Berninger, Senior Systems Engineer, Carbon Black Recorded: Mar 28 2017 9:00 am UTC 60 mins
    • Data-driven security is the future, but alarm fatigue and data overload continue to hold Security Operations teams back. Fortunately, there are some easy ways to organise and correlate data so you can simplify the threat hunting process and free up your resources to better detect, respond and neutralise advanced threats.

      In this webcast, Greg Foss, Security Architect at LogRhythm, and Chris Berninger, Senior Systems Engineer at Carbon Black, discuss how to proactively search for and detect threats in your network.

      You’ll learn:

      • To use endpoint data to gain visibility into your network and understand what’s really going on in your network
      • How LogRhythm SmartResponse can help orchestrate security operations
      • Threat hunting techniques using Carbon Black within LogRhythm

      Register now to discover how to use insights from endpoint data to best protect your organisation from advanced attacks.

      Read more >
    • Maximising the benefits of carbon management
      Maximising the benefits of carbon management Sumit Bose, Energy Live News Recorded: Jun 11 2013 1:00 pm UTC 60 mins
    • This webinar is set to debunk the myths and explain the realities of one of the biggest buzz words of recent times – Sustainability.
      What does it really mean? Does it cost money? What do you have to do to be sustainable? Am I being forced to be sustainable or are there really benefits to me and my business?
      These are the issues that will be dealt with during the “Maximising the benefits of carbon management” webinar that is being run by Schneider Electric Professional Services on June 11, 2013.
      Three of their top experts will explain Sustainability Strategies and Climate Change Policy; Sustainability and Energy Reporting; and Sustainability Resourcing.
      In one hour they will show how you can easily become legislation compliant, while improving performance, and not having to spend large amounts of money.
      There will also be opportunities to put direct questions to the panel to gain further insight.

      Sustainability Strategies and Climate Change Policy
      Russell Monkman – Head of Compliance Services, Schneider Electric – Professional Services

      - Regulatory landscape – CCA, CRC, EU-ETS, ISO50001
      - Strategic approach to legislation and your long-term sustainability challenges
      - Benefits of a proactive approach

      Sustainability and Energy Reporting
      Andy Dewis – Sustainability Director, Schneider Electric – Professional Services

      - Customise your experience
      - Know your spend & usage
      - Track performance
      - Manage projects & scenarios
      - Control your environmental impact
      - Monitor the markets

      Sustainability Resourcing
      Adam Pigott - Head of Resource Efficiency, Schneider Electric – Professional Services

      - Reducing resource cost doesn't have to equate to spending lots of money
      - Importance and benefits of continuous improvement

      Read more >
    • Detecting Network Threats: What Can Endpoint Data Tell You?
      Detecting Network Threats: What Can Endpoint Data Tell You? Greg Foss, Security Architect, LogRhythm & Chris Berninger, Senior Systems Engineer, Carbon Black Recorded: Mar 15 2017 5:00 pm UTC 59 mins
    • Data-driven security is the future, but alarm fatigue and data overload continue to hold Security Operations teams back. Fortunately, there are some easy ways to organize and correlate data so you can simplify the threat hunting process and free up your resources to better detect, respond and neutralize advanced threats.

      In this webcast, Greg Foss, Security Architect at LogRhythm, and Chris Berninger, Senior Systems Engineer at Carbon Black, discuss how to proactively search for and detect threats in your network.

      You’ll learn:

      • To use endpoint data to gain visibility into your network and understand what’s really going on in your network
      • How LogRhythm SmartResponse can help orchestrate security operations
      • Threat hunting techniques using Carbon Black within LogRhythm

      Register now to discover how to use insights from endpoint data to best protect your organization from advanced attacks.

      Read more >
    • The Rise of Malware-less Attacks: How Can Endpoint Security Keep Up?
      The Rise of Malware-less Attacks: How Can Endpoint Security Keep Up? Paul Morville, Carbon Black, Chris Sherman, Forrester Research, Adrian Davis, (ISC)² EMEA Recorded: Jan 30 2017 1:30 pm UTC 61 mins
    • The security industry is witnessing a rapid evolution in attack techniques - including advanced polymorphic malware and file-less attacks. In fact, according to the 2016 Verizon Data Breach Report, the majority of breaches (53%) involve no malware.

      Clearly, traditional antivirus (AV) solutions no longer stop advanced attacks. Modern attackers can easily get their hands on the static and highly predictable prevention models used by legacy AV vendors, which means they can reliably bypass them. Unfortunately, many emerging “next-gen” vendors are using approaches that fall victim to the same fundamental flaw.

      In this webinar with guest speaker Chris Sherman, Senior Analyst at Forrester Research, we will discuss the latest trends in endpoint security, including results from The Forrester Wave™: Endpoint Security Suites, Q4 2016. Carbon Black's Paul Morville will talk about how to stop these pervasive attack techniques.

      Topics Covered On the Webinar:
      •Forrester analysis on new security threats and the need for a next-generation of endpoint security
      •Forrester Endpoint Security Wave Report results
      •How next-gen antivirus makes it harder for attackers to achieve their objectives

      Read more >
    • Activated Charcoal: Making sense of endpoint data
      Activated Charcoal: Making sense of endpoint data Greg Foss, Head of Global Security Operations, LogRhythm and Sarah Miller Threat Intelligence Analyst, Carbon Black Recorded: Oct 26 2016 1:00 pm UTC 64 mins
    • Security operations is all about understanding and acting upon of large amounts of data. When you can pull data from multiple sources, condense it down and correlate across systems, you are able to highlight trends, find flaws and resolve issues.

      This webcast will cover the importance of monitoring endpoints and how to leverage endpoint data to detect, respond and neutralise advanced threats.

      You’ll discover:

      • Why endpoints are the new perimeter
      • How employees can strengthen your security operations strategy
      • Techniques to test and validate security awareness program
      • How to take the data that Carbon Black collects, correlate it against thousands of endpoints, and dynamically neutralise threats using the LogRhythm security intelligence and analytics platform

      Register now to learn how LogRhythm and Carbon Black can help you strengthen your overall security operations strategy—all within a single interface.

      Read more >
    • Activated Charcoal: Making Sense of Endpoint Data
      Activated Charcoal: Making Sense of Endpoint Data Greg Foss, Head of Global Security Operations, LogRhythm and Sarah Miller Threat Intelligence Analyst, Carbon Black Recorded: Oct 12 2016 6:00 pm UTC 63 mins
    • Security operations is all about understanding and acting upon of large amounts of data. When you can pull data from multiple sources, condense it down and correlate across systems, you are able to highlight trends, find flaws and resolve issues.

      This webcast will cover the importance of monitoring endpoints and how to leverage endpoint data to detect, respond and neutralize advanced threats.

      You’ll discover:

      - Why endpoints are the new perimeter
      - How employees can strengthen your security operations strategy
      - Techniques to test and validate security awareness program
      - How to take the data that Carbon Black collects, correlate it against thousands of endpoints, and dynamically neutralize threats using the LogRhythm security intelligence and analytics platform

      Register now to learn how LogRhythm and Carbon Black can help you strengthen your overall security operations strategy—all within a single interface.

      Read more >
    • Conquering Challenges of Incident Response: Real-Time Hunting and Response
      Conquering Challenges of Incident Response: Real-Time Hunting and Response Stephen Jones, Director of Managed Services, GuidePoint Security; Justin Scarpaci, Technical Solutions Lead, Carbon Black Recorded: Nov 17 2016 7:30 pm UTC 37 mins
    • Are you an information security professional struggling with labor-intensive and slow-moving incident response processes? According to a recent Enterprise Strategy Group survey, more than 60 percent of information technology professionals say their organization has taken steps to automate incident response, but 91 percent say the processes are not very effective or efficient. The problem? Information security teams are limited by time and have too many manual processes.

      Join GuidePoint Security and Carbon Black for “Conquering Challenges of Incident Response: Real-Time Incident Hunting and Response,” a free, interactive webinar at 2:30 p.m. Thursday, Nov. 17. Together, we will explore:
      Cost-efficient and time-saving solutions to help your team monitor your environment
      Tools to help you hunt for and find potential attacks, quarantine them, and react before real damage is done

      Learn from real-world analysts and incident responders who know firsthand just how challenging incident response can be. We’ll show you how to leverage today’s threat-hunting tools to:
      - Hunt for incidents in real time
      - Visualize a complete attack kill chain
      - Efficiently defend your environment
      - Monitor endpoints around-the-clock for attacks based on Patterns of Compromise (POCs)
      - Secure devices on or off network
      - Review continuously recorded histories of endpoint activity
      - Quickly conduct comprehensive investigations and identify threat activity
      - Minimize data loss and potential impact on your organization
      - Deploy rapid response and remediation services

      Who Should Attend:
      - Information security professionals struggling with effective incident response because of limited time and resources
      - Current MSSP customers not satisfied with their current provider(s)
      - Information security professionals wanting to improve the effectiveness of their logging and monitoring and/or vulnerability management programs

      Read more >
    • Stay Ahead of the Curve: Next-Gen Antivirus is Coming
      Stay Ahead of the Curve: Next-Gen Antivirus is Coming John D Wood, Carbon Black Defense Regional Manager, Europe, Adrian Davis, Managing Director (ISC)² Recorded: Sep 20 2016 11:00 am UTC 61 mins
    • After years of talking about it, companies are finally ready to begin the process of replacing traditional antivirus software. Next-generation antivirus vendors claim to protect endpoints from modern threats like PowerShell attacks and obfuscated malware with much higher effectiveness. But what exactly makes an antivirus product “next-generation”?

      This webcast led by John D Wood, Carbon Black Defense Regional Manager, will dive into the technology behind next-generation antivirus so that IT and security teams can cut through the noise and properly evaluate the next wave of solutions.

      In this webcast you will learn:

      •What distinguishes next-gen antivirus from traditional antivirus
      •How technology behind next-gen antivirus works to stop modern threats
      •How to overcome the challenges customers face replacing traditional antivirus
      •Establishing a “side-by-side” strategy for moving to a next-generation antivirus solution

      Read more >