Hi [[ session.user.profile.firstName ]]
Sort by:
    • Driving adoption of Commercial Analytic solutions Driving adoption of Commercial Analytic solutions Dominic Tyer Recorded: Oct 25 2016 2:30 pm UTC 50 mins
    • Commercial analytic solutions are becoming more and more common within the Pharma industry. Companies are spending millions implementing tools which are aimed at helping users identify opportunities to improve the bottom line, segment customers, track multichannel campaign success and meet a myriad of other objectives. Despite all the 'perceived' value these tools can add, they remain largely unused. Excuses for the lack of adoption are varied but can generally be classified into one of three areas - they are either too complex, it isn't convenient to use or it just doesn't deliver on the value promised. These issues are compounded by the fact that they are generally only identified when the solution has been deployed and expected to be used. By ensuring that these issues are addressed at all stages during the development and not just when adoption targets are not being met, commercial analytic solutions can be exploited to attain the anticipated value and more.

      Read more >
    • What is Precision Content and Why Do We Need It? What is Precision Content and Why Do We Need It? Scott Abel, The Content Wrangler, and Rob Hanna of Precision Content Upcoming: Dec 7 2016 9:00 pm UTC 60 mins
    • Precision Content is a series of methods and principles for structured authoring developed by Rob Hanna in 2013. This methodology is based on a well-known body of research founded in cognitive and behavioral sciences that theorizes that all structured information can be classified into one of a discrete number of information types. Each of these information types defines how the information is best structured and written to suit the intended reader response.

      Join Scott Abel, The Content Wrangler and his special guest, Rob Hanna, President of Precision Content for this free, one-hour webinar. In this session, Rob will guide you through an interactive exploration into how our brains work with information; explain how the Precision Content information types work to capture information used in any piece of business or technical content; discuss how Precision Content can help authors working with DITA/XML, and demonstrate how Precision Content is used to provide better clarity and precision to information.

      Read more >
    • Skin Cancer and Immunohistochemistry Skin Cancer and Immunohistochemistry Jeff Gordon, Director OEM Sales - Cell Marque Corporation, Rocklin CA Recorded: Jun 22 2016 3:00 pm UTC 63 mins
    • Skin cancer is by far the most prevalent cancer. Each year, approximately 3.4 million people in the US alone are diagnosed with some form of skin cancer. Skin cancer can be highly treatable if it is detected and classified early, and this detection and classification is often aided by immunohistochemistry. This presentation covers many of the basic science, facts, and statistics of skin cancer, as well as the utility of immunohistochemical testing with markers such as S-100, SOX-10, Ber-Ep4, and HHV-8 in the accurate diagnosis and survival rates of skin cancer. Continuing education credits for attending this webinar will be offered through the National Society of Histotechnology

      Read more >
    • Vendor Risk Management Scenarios That Haunt You Vendor Risk Management Scenarios That Haunt You Matt Cherian Upcoming: Oct 27 2016 5:30 pm UTC 60 mins
    • Whether you are in the beginning stages of implementing a vendor risk management (VRM) program, or you have a robust program, there are always scenarios that can blindside your organization. Compounding this uncertainty is the dynamic environment of cyber risk. Yet, there are tools and techniques organizations can leverage in order to reduce uncertainty about the security of their third parties and vendors.

      Join Matt Cherian, Director of Products at BitSight as he discusses how to grapple with common vendor risk scenarios. In this webinar, viewers will learn:

      - How to gain full visibility into the security of your critical third parties to avoid being caught off guard
      - How to understand and communicate potential threats occurring on the networks of your third parties
      - What to do when an infection- or breach occurs

      Read more >
    • Bridging the Gap on Data Breaches: What Makes the Difference? Bridging the Gap on Data Breaches: What Makes the Difference? Jay Jacobs, Dave Bradford Upcoming: Nov 10 2016 5:00 pm UTC 60 mins
    • Every organization wants to know how to best protect their systems and data – but exactly where to focus efforts and resources can be daunting. Compromised machines, outdated software, certificate mismanagement, and faulty encryption practices can all increase the risk that an organization will experience a breach, but is there one single area on which businesses should concentrate?

      In this webinar, Jay Jacobs, Senior Data Scientist at BitSight discusses new research on common characteristics exhibited by organizations that have suffered data breaches. Dave Bradford, Chief Strategy Officer and Director of Strategic Partnership Development at Advisen will discuss how this research is relevant for carriers and providers of cyber insurance.

      Read more >
    • Cybersecurity Benchmarking For CIOs Cybersecurity Benchmarking For CIOs Jake Olcott, Tom Stumpek Upcoming: Nov 29 2016 5:00 pm UTC 60 mins
    • In order for a business to be competitive, it must be continuously improving. This is something the modern chief information officer (CIO) knows all too well. Further, technological advances and greater outsourcing in business have made cyber risk a key area that requires a great deal of thought from the CIO. So, how can CIOs know how their security programs are performing in order to make decisions on allocating funding, headcount, and policies?

      Join Jake Olcott. VP of Business Development at BitSight and Tom Stumpek, a Technology Advisor and former CIO for GE. Attendees will learn:

      - Why cybersecurity benchmarking is difficult for the modern CIO.
      - Different methods of benchmarking you may be involved in (or want to consider).
      - How Security Ratings may solve many benchmarking challenges.

      Read more >
    • Managing Cyber Risk In Your Supply Chain Managing Cyber Risk In Your Supply Chain Jake Olcott, VP at BitSight Recorded: Oct 21 2016 3:00 pm UTC 61 mins
    • Large data breaches have caused executives to invest significant time and resources in improving cybersecurity within their own companies. But now the attackers are targeting an organization’s weakest links - business partners and contractors who have access to the most sensitive data. How should senior leaders develop a strategy to manage third party cyber risk? Who are the most critical business partners to be concerned about? How can contractual language reduce the risk? Is there a way to gain real-time visibility into the security posture of the supply chain? And what are the regulators saying about all of this?

      Join Jake Olcott, Vice President at BitSight Technologies as he talks about:

      - Assessing your organization’s maturity with respect to managing third party cyber risk
      ​- Building a third party cyber risk management program
      - Regulatory requirements for third and fourth-party cyber risk management
      - Incorporating real-time data into your vendor risk management program

      Read more >
    • Managing Cyber Risk From Third Party Contractors Managing Cyber Risk From Third Party Contractors Jake Olcott Recorded: Aug 30 2016 3:00 pm UTC 46 mins
    • Many recent data breaches have exploited security weaknesses in the networks of third parties to attack businesses. With supply chains growing and business functions increasingly outsourced, the number of third party organizations with access to your company’s most sensitive data has increased dramatically. How should organizations assess and manage the cyber risk by their vendors and suppliers? What kinds of policies and controls should organizations put in place in order to mitigate third party cyber risk? How can organizations continuously monitor the cybersecurity performance of their critical vendors in real time?

      Getting familiar with third party cyber risk management best practices and industry standards is a good start towards mitigating cyber risk for your organization. Join Jake Olcott, VP of Business Development as he discusses these topics and more.

      Read more >
    • Tips and Tricks For Tackling Vendor Risk Tips and Tricks For Tackling Vendor Risk Andrew Calo, Manager of Technology Risk Recorded: Aug 11 2016 3:00 pm UTC 48 mins
    • With so many moving parts pushing an organization forward, companies today must know who has access to their data—making vendor risk management (VRM) a critical business practice. Unfortunately, not all organizations have the resources to staff full-time vendor risk managers. Security professionals now must wear multiple hats in order to reduce operating risk for their organizations. Even if vendor risk management isn’t a primary focus, there are techniques and tools security professionals can implement to make it an efficient and valuable process for your company.

      In this webinar, join Andrew Calo, Manager of Technology Risk at BitSight as he offers tips and techniques to efficiently manage and assess vendor risk. Attendees will learn about:

      -Basic questions you need to ask all vendors
      -The top risk vectors and configurations to look at it
      -The value and impact of continuous risk monitoring software

      Read more >
    • How The CISO For Fannie Mae Monitors The Security Of Third Parties How The CISO For Fannie Mae Monitors The Security Of Third Parties John Pescatore, Chris Porter Recorded: Jun 16 2016 4:00 pm UTC 60 mins
    • Many recent breaches have exploited security weaknesses in third party vendors and suppliers to attack business and government agencies. In this webinar, the Deputy CISO at Fannie Mae details his experience using BitSight Security Ratings to assess the cybersecurity level of third party business partners and vendors, as well as using BitSight for ongoing monitoring of externally visible signs of lapses in security levels. This presentation will contain a discussion of lessons learned and best practices as well as detail the metrics used to demonstrate the business value gained by a repeatable and ongoing approach for monitoring third party security levels.

      Read more >
    • From Signal to Action: Security Metrics that Drive Business Decisions From Signal to Action: Security Metrics that Drive Business Decisions Stephen Boyer, Jay Jacobs Recorded: Jul 28 2016 4:00 pm UTC 42 mins
    • How can companies effectively measure their company’s risk of a data breach? Which security metrics are most important when it comes to determining cyber risk? How do different types of security compromises, whether botnet infections or brand name SSL vulnerabilities, contribute to an organization’s risk profile?

      In this presentation, BitSight’s Chief Technology Officer Stephen Boyer and Senior Data Scientist Jay Jacobs answer these questions and more. This data-driven webinar will highlight the extensive analysis that the BitSight Data Science team undertakes to make security signals into concrete risk mitigation actions. Perhaps most importantly, the speakers will give guidance on how security and risk professionals at every level - from the board room to the server room - can drive positive change throughout their organizations.

      Read more >