Hi [[ session.user.profile.firstName ]]
Sort by:
    • What is Precision Content and Why Do We Need It?
      What is Precision Content and Why Do We Need It? Rob Hanna, President of Precision Content Recorded: Dec 7 2016 9:00 pm UTC 60 mins
    • Precision Content is a series of methods and principles for structured authoring developed by Rob Hanna in 2013. This methodology is based on a well-known body of research founded in cognitive and behavioral sciences that theorizes that all structured information can be classified into one of a discrete number of information types. Each of these information types defines how the information is best structured and written to suit the intended reader response.

      Join Scott Abel, The Content Wrangler and his special guest, Rob Hanna, President of Precision Content for this free, one-hour webinar. In this session, Rob will guide you through an interactive exploration into how our brains work with information; explain how the Precision Content information types work to capture information used in any piece of business or technical content; discuss how Precision Content can help authors working with DITA/XML, and demonstrate how Precision Content is used to provide better clarity and precision to information.

      Read more >
    • Driving adoption of Commercial Analytic solutions
      Driving adoption of Commercial Analytic solutions Dominic Tyer Recorded: Oct 25 2016 2:30 pm UTC 50 mins
    • Commercial analytic solutions are becoming more and more common within the Pharma industry. Companies are spending millions implementing tools which are aimed at helping users identify opportunities to improve the bottom line, segment customers, track multichannel campaign success and meet a myriad of other objectives. Despite all the 'perceived' value these tools can add, they remain largely unused. Excuses for the lack of adoption are varied but can generally be classified into one of three areas - they are either too complex, it isn't convenient to use or it just doesn't deliver on the value promised. These issues are compounded by the fact that they are generally only identified when the solution has been deployed and expected to be used. By ensuring that these issues are addressed at all stages during the development and not just when adoption targets are not being met, commercial analytic solutions can be exploited to attain the anticipated value and more.

      Read more >
    • How to Address the Biggest Hole in Identity and Access Security
      How to Address the Biggest Hole in Identity and Access Security Tatu Ylonen, Founder & SSH Fellow, SSH Communications Security, Inc. Upcoming: May 17 2017 3:00 pm UTC 60 mins
    • IDC called SSH keys “the gaping hole in your IAM strategy.” For a reason, when many banks and enterprises have literally millions of unaudited credentials granting access to their production servers and use OpenSSH configurations that allow any system administrator to self-provision permanent access to any server they use - for themselves and others - and there is no termination process for this access.

      It is a fundamental question of Who can access what, of separation of duties, and of enforcing internal boundaries (to PCI systems, financial data, health information, development vs. production, or classified compartments). Every cybersecurity regulation requires basic control of identities and access, and that is where real security starts.

      Half of the top 10 banks in US and UK have now began addressing the issue. Most other enterprises are only beginning to grasp the problem.

      This talk explains the issue and how to start addressing it. By the principal author of NIST IR 7966, the NIST guidelines for managing SSH access.

      About the Presenter:
      Tatu Ylonen is a cybersecurity pioneer with over 20 years of experience from the field. He invented SSH (Secure Shell), which is the plumbing used to manage most networks, servers, and data centers and implement automation for cost-effective systems management and file transfers. He is has also written several IETF standards, was the principal author of NIST IR 7966, and holds over 30 US patents - including some on the most widely used technologies in reliable telecommunications networks.

      Read more >
    • Skin Cancer and Immunohistochemistry
      Skin Cancer and Immunohistochemistry Jeff Gordon, Director OEM Sales - Cell Marque Corporation, Rocklin CA Recorded: Jun 22 2016 3:00 pm UTC 63 mins
    • Skin cancer is by far the most prevalent cancer. Each year, approximately 3.4 million people in the US alone are diagnosed with some form of skin cancer. Skin cancer can be highly treatable if it is detected and classified early, and this detection and classification is often aided by immunohistochemistry. This presentation covers many of the basic science, facts, and statistics of skin cancer, as well as the utility of immunohistochemical testing with markers such as S-100, SOX-10, Ber-Ep4, and HHV-8 in the accurate diagnosis and survival rates of skin cancer. Continuing education credits for attending this webinar will be offered through the National Society of Histotechnology

      Read more >
    • How to Mitigate Cyber Risk with Efficient Vendor Risk Management
      How to Mitigate Cyber Risk with Efficient Vendor Risk Management Kevin Roden and Julia Grunewald Recorded: Feb 22 2017 6:00 pm UTC 42 mins
    • Over the past few years, outsourcing business functions to vendors has been on the rise. In fact, there are more third-party relationships today than ever before. However, as the number of supplier relationships grows, so grows the amount of risk those suppliers pose. And in today’s hyper-connected landscape, cyber risk has taken center stage when it comes to vendor risk.

      Join former CIO, Kevin Roden, and BitSight’s Senior Customer Success Manager, Julia Grunewald, on Wednesday, February 22nd at 1pm ET, as they discuss traditional and emerging vendor risk management (VRM) tactics.

      In this webinar you’ll learn:
      - How VRM has traditionally been handled
      - Why traditional strategies alone aren’t enough
      - Advice on how to effectively and efficiently mitigate cyber risk

      Read more >
    • 3 Ways to Improve Your Security Performance This Year
      3 Ways to Improve Your Security Performance This Year Julia Grunewald, Senior Customer Success Manager, BitSight Technologies Upcoming: Mar 9 2017 8:00 pm UTC 30 mins
    • With new cyber attacks and data breaches emerging on a daily basis, today’s organizations need a deeper understanding of the security performance of their programs, policies, and third parties. That’s why many companies are now using BitSight Security Ratings to help measure and mitigate cyber risk across their business ecosystems.

      On Wednesday, December 21st at 12 pm ET, join BitSight Technologies’ Senior Customer Success Manager, Julia Grunewald, as she discusses how you can improve your organization’s security rating by improving your overall security posture.

      In this webinar, you’ll learn:

      - Three ways to improve your security performance in 2017
      - What impact these changes could have on your Security Rating
      - How to use BitSight Security Ratings to prioritize the remediation of security events and issues

      Read more >
    • Presenting Cybersecurity to the Board: Your How-to for Success
      Presenting Cybersecurity to the Board: Your How-to for Success Richard Clarke, Jasper Osstenjuk, Jake Olcott Recorded: Jan 25 2017 6:00 pm UTC 62 mins
    • Today, cybersecurity is a #1 concern for board members. But what do they need to know? And how should it be presented?

      Richard Clarke has a pretty good idea. As a senior White House advisor to four U.S. Presidents, a member of three corporate boards, and CEO of Good Harbor Security Risk Management, he’s talked cybersecurity in both the Situation Room and the boardroom.

      Jasper Ossentjuk also knows how to present cybersecurity in the boardroom. As SVP and CISO for TransUnion, Jasper regularly presents information to his Board about his organization's security posture.

      On January 25th at 1:00PM ET, join Richard and Jasper for a discussion of:

      - What cybersecurity metrics and measurements are most important for the board
      - Methods for security leaders to communicate security issues across the enterprise
      - How to graphically represent your cybersecurity program

      Read more >
    • Bridging the Gap on Data Breaches: What Makes the Difference?
      Bridging the Gap on Data Breaches: What Makes the Difference? Jay Jacobs, Dave Bradford Recorded: Nov 23 2016 7:00 pm UTC 57 mins
    • Every organization wants to know how to best protect their systems and data – but exactly where to focus efforts and resources can be daunting. Compromised machines, outdated software, certificate mismanagement, and faulty encryption practices can all increase the risk that an organization will experience a breach, but is there one single area on which businesses should concentrate?

      In this webinar, Jay Jacobs, Senior Data Scientist at BitSight discusses new research on common characteristics exhibited by organizations that have suffered data breaches. Dave Bradford, Chief Strategy Officer and Director of Strategic Partnership Development at Advisen will discuss how this research is relevant for carriers and providers of cyber insurance.

      Read more >
    • 3 Tips to Improve your Security Posture in 2017
      3 Tips to Improve your Security Posture in 2017 Julia Grunewald, Senior Customer Success Manager at BitSight Technologies Recorded: Dec 21 2016 5:00 pm UTC 23 mins
    • With new cyber attacks and data breaches emerging on a daily basis, today’s organizations need a deeper understanding of the security performance of their programs, policies, and third parties. That’s why many companies are now using BitSight Security Ratings to help measure and mitigate cyber risk across their business ecosystems.

      On Wednesday December 21st at 12pm ET, join BitSight Technologies’ Senior Customer Success Manager, Julia Grunewald, as she discusses how you can improve your organization’s security rating by improving your overall security posture.

      In this webinar, you’ll learn:
      - Three ways to improve your security performance
      - What impact these changes could have on your Security Rating
      - How to use BitSight Security Ratings to prioritize the remediation of security events and issues

      Read more >
    • Cybersecurity Benchmarking For CIOs
      Cybersecurity Benchmarking For CIOs Jake Olcott, Tom Stumpek Recorded: Nov 29 2016 5:00 pm UTC 60 mins
    • In order for a business to be competitive, it must be continuously improving. This is something the modern chief information officer (CIO) knows all too well. Further, technological advances and greater outsourcing in business have made cyber risk a key area that requires a great deal of thought from the CIO. So, how can CIOs know how their security programs are performing in order to make decisions on allocating funding, headcount, and policies?

      Join Jake Olcott. VP of Business Development at BitSight and Tom Stumpek, a Technology Advisor and former CIO for GE. Attendees will learn:

      - Why cybersecurity benchmarking is difficult for the modern CIO.
      - Different methods of benchmarking you may be involved in (or want to consider).
      - How Security Ratings may solve many benchmarking challenges.

      Read more >
    • Exploring the Current State of Cybersecurity in the Legal Sector
      Exploring the Current State of Cybersecurity in the Legal Sector Jake Olcott, VP of Business Development at BitSight Technologies and Jay Jacobs, Sr. Data Scientist at BitSight Technologies Recorded: Jan 19 2017 6:00 pm UTC 45 mins
    • Despite the fact that third party breaches have been on the rise, organizations may not be doing enough to manage the cybersecurity of all of their critical vendors. Law firms, in particular, are one of the most widely used third parties, yet the Legal sector may be getting overlooked in vendor security discussions.

      In fact, the latest BitSight Insights Industry Index report revealed that although companies in the Legal sector have high security ratings and low rates of vulnerabilities, the industry remains a key target for cyber criminals. Therefore, it’s crucial for organizations in this space to understand their cybersecurity posture and improve their vendor risk management techniques.

      Join Jake Olcott, VP at BitSight, and Jay Jacobs, Sr. Data Scientist at BitSight as they discuss data security in the Legal sector and beyond. In this webinar, you’ll learn:

      - How the cybersecurity posture of the Legal sector has changed over time
      - How the Legal sector stacks up against six other industries
      - The importance of cybersecurity in the Legal sector

      Read more >
    • The Data Disconnect: Why Not All Security Ratings are Created Equal
      The Data Disconnect: Why Not All Security Ratings are Created Equal Stephen Boyer, CTO and Co-founder of BitSight, Dave Shackleford, Voodoo Security and SANS Recorded: Dec 20 2016 5:00 pm UTC 61 mins
    • From time-consuming audits to expensive penetration tests, evaluating a company’s security posture can seem like a daunting task. However, today’s organizations are increasingly adopting Security Rating Services (SRS) as a means to quantify and monitor their own cyber risk, as well as the risk of their third party vendors.

      So, how should you go about using security ratings? What’s the real difference between different rating services? And how does that impact your business?

      Join BitSight Technologies’ CTO and Co-founder, Stephen Boyer, and Dave Shackleford of SANS as they discuss the importance of curating high-quality data for security ratings and explore why verifiable data should be at the heart of any security rating solution.

      In this webinar, you’ll learn:
      - The key components of highly-actionable security ratings
      - How those components impact your cyber risk
      - Why data quality is so important
      - What the difference between subpar and superior security ratings could mean for your business

      Read more >
    • Vendor Risk Management Scenarios That Haunt You
      Vendor Risk Management Scenarios That Haunt You Matt Cherian Recorded: Oct 27 2016 5:30 pm UTC 32 mins
    • Whether you are in the beginning stages of implementing a vendor risk management (VRM) program, or you have a robust program, there are always scenarios that can blindside your organization. Compounding this uncertainty is the dynamic environment of cyber risk. Yet, there are tools and techniques organizations can leverage in order to reduce uncertainty about the security of their third parties and vendors.

      Join Matt Cherian, Director of Products at BitSight as he discusses how to grapple with common vendor risk scenarios. In this webinar, viewers will learn:

      - How to gain full visibility into the security of your critical third parties to avoid being caught off guard
      - How to understand and communicate potential threats occurring on the networks of your third parties
      - What to do when an infection- or breach occurs

      Read more >