Recent enforcement actions by bank regulators are heightening the need to establish formal policies for third party vendor management. Financial institutions that use outside firms for all types of underwriting and other bank functions are ramping up their oversight of outside firms and for some, the data management burden is not insignificant. This timely event will focus specifically on how risk managers can develop effective policies for managing outside vendors for appraisals and environmental assessments.
EDR is pleased to host a webinar on this timely topic with Mitch Kreeger, a well-known subject matter expert on valuation, environmental and seismic risk, and regulatory compliance topics, will share his insights and advice on establishing an effective vendor management policy for appraisers and environmental professionals. Kreeger will explore the myriad ways that attendees can improve vendor management, from initial project bidding to vendor selection to monitoring vendors over time.
At this educational webinar, attendees will receive advice on managing relationships with appraisers and environmental consultants, including answers to the following:
• What should we consider in selecting the “right” vendor for the job?
• How do we find quality appraisers? EPs?
• What guidance should our institution be giving our appraisers and EPs?
• What criteria should we be using to grade vendors and monitor performance?
• How are banks facing today’s vendor management challenges?
This webinar will review the things that are missing in many of the people who want to become a computer security consultant. Many people start off at the Application Layer (layer 7), in this webinar we will discuss the importance of establishing a solid security foundation; we will look at the three main components to build this foundation. Those are:
During the webinar we will discuss mastering the power of the command line and the importance of understanding the traffic at the lowest level … the packet! We will also look at some simple but important protocol analysis techniques.
The webinar is an introduction to the Core Concepts course that was developed to provide those entering the fascinating world of computer security consulting, a foundation prior to embarking on this journey. The more solid foundation of skills you have the better you will be prepared as a consultant or security professional.
The CRO+Consultant+Sponsor Relationship: Collaborating to Ensure Sponsor and Client Success.Collaboration is the key to a successful consulting partnership. This webinar will focus on the responsibilities and perspectives of key stakeholders (Sponsor, consultant and CRO), how to make the most out of the Sponsor/consultant relationship, and key considerations when partnering with a contract research organization. Explore ways to optimize your consultant relationships to ensure success!Read more >
75 CLAS Consultants participated in an Independent Survey into Network Security. During this webcast you will learn:
- How CLAS Consultants percieve the threat of Network Hacking, as part of the Threat Lanscape
- What are the trend that they see that are contributing the increased threat levels surrounding the Security of Networks
- What types of remediation/ security technologies can be used to address the challenges
While adoption of new technologies such as e-banking has created new channels to give customers a unique anytime anywhere banking convenience, the systems that banks depend on to deliver their services have multiplied and grown much more complex.
The effect of this increasing complexity has been to create more opportunities for fraudsters to gain access to critical systems, while at the same time making it harder for banks to have a clear overview of all the activity taking place on their systems. Cybercrime cost is projected to reach $2 trillion by 2019 (Juniper Research). Therefore, bridging the gap between adapting new digital technologies and keeping the systems secure has become one the biggest challenges for banks.
With this webinar this you will learn first-hand from NetGuardians’ Risk Consultant John Kiptum:
-How to detect e-banking fraud in real-time with dynamic profiling & pattern-based intelligence and prevent fraud before it happens.
-End-to-end risk mitigation approach; from data extraction to controls application, KRI Dashboard, and workflow.
-Solution examples in real-life
Have you ever wondered why so many organisations around the world embrace the Myers-Briggs Type Indicator® (MBTI) for individual, team and leadership development? In this 30-minute webcast, OPP’s senior consultants will reveal the power of understanding personality difference, exploring the impact it can have on engaging individuals and driving improvements in performance. Suitable for those who have no knowledge of the MBTI tool, as well as those who want to refresh their understanding of the benefits of knowing and applying your personality type at work.Read more >
Interview in partnership with BrightTALK, The Stack and Cloud Industry Forum
In this interview, Simon Ractliffe, Principal Consultant & IT Evangelist, Ensono, shared with us ideas, recommendations and best practices on how to deliver DevOps in a legacy world.
Among topics discussed:
- Is DevOps for the legacy world?
- What are the challenges of DevOps for legacy systems?
- What makes the delivery of DevOps in a legacy world so different from the other worlds (start-up world, continuous delivery world, growth world etc?)
- Case examples in which legacy organisations thrived or failed from adopting DevOps
- And others
About the Speaker:
For publications see Simon's author page on the Digital Transformation People - http://www.thedigitaltransformationpeople.com/authors/simon-ratcliffe
With phishing attacks accounting for over 90% of all breaches and the cost of cybercrime rising, is your company doing all it can to prevent a phishing attack and costly breach?
The results are in and PhishMe’s suite of anti-phishing solutions can help protect you against attacks. Forrester Consulting has analyzed the Total Economic Impact (TEI) of implementing PhishMe’s Human Phishing Defense Solutions and the results are outstanding!
Join this webcast, featuring Rohyt Belani, PhishMe’s CEO and Dean Davison, Forrester Principal Consultant to learn more about PhishMe Solutions and the benefits Forrester identified such as:
- Return on Investment (ROI) of 336%
- Payback in less than 3 months
- Time required to address phishing threats reduced by 30%
- Employee click rate reduced on average by 80%.
Each customer undertakes a unique journey, incorporating multiple channels and exhibiting different behaviors. Although this means huge potential for marketers to better engage with customers, actually tracking this behavior, and making use of the data, can seem like an insurmountable challenge for marketers.
In this webinar, BlueVenn Principal Consultant Jim Kelly will explore this topic in more detail and discuss concepts such as ‘cross-journey communication’ to manage the customer experience.
You will learn:
•New ways to monitor cost
Senior Analyst & Consultant Mike Matchett dives into graph databases, and Why Facebook and the NSA love them.Read more >
This webinar examines the common misconceptions and questions surrounding starting a SCV project. Jim Kelly, Principal Consultant at Blue Group, takes you through the benefits, technicalities, improvements and ROI that an SCV could bring your organization.
Having consulted for some of the biggest names in the retail, leisure, finance and insurance industries, Jim provides an honest and fair representation of the benefits and complexities of building an SCV.
It’s a bird, it’s a plane, no it’s just your legacy SIEM. Did you know your SIEM might be weakening your security powers? Your legacy SIEM could be:
• Limiting your ability to collect, store and use security-relevant unstructured and structured data
• Making it difficult to maintain your SIEM and requiring skilled staff to work around the clock just to keep the lights on
• Burdening your security operations team by forcing them to chase false alarms while missing critical alerts
• Failing to detect modern threats and putting your entire business at risk
But have no fear, Splunk’s security experts are here to make you a security super hero again. Put on your cape and join us for this webinar to learn how Splunk can be used as a modern SIEM to solve a range of security use cases and more.
Splunk’s security experts will share common SIEM replacement and migration scenarios and discuss how a department store, a financial services firm and a luxury retailer successfully migrated from their legacy SIEM to Splunk.
Girish Bhat, Splunk director of security product marketing
Risi Avila, Security professional services consultant
10 mins – The challenges of having a legacy SIEM
15 mins – The options to migrate
15 mins – Customer success stories
5 mins – Resources to guide and help you
10mins – Q&A
According to a recent SANS report, more than 60 percent of large-company CISOs brief the board at least annually and by the end of 2018, 70 percent of all boards will require CISOs to brief them quarterly.^
Deciding to what degree your security operations should be in-house vs outsourced is a major decision with significant cost and resource ramifications. Currently organizations globally face persistent security challenges, which collectively require people, process, technology, and strategy to address. This collection of challenges are further complicated by evolving business needs; expanding toolsets and platform options; and staffing retention and attrition. Join us to learn how a modern approach to security operations can help address these challenges.
SecureWorks Principal Cyber Security Operations Consultant and former Security Operations Center (SOC) manager, Travis Wiggins, will discuss how security leaders and practitioners can leverage his experience to more clearly define the requirements and make informed decisions about protecting your organization.
You Will Learn:
• Why making the right security operations decisions is critical to reduce business risk
• What to consider when planning a SOC and how to position the plan to leaders
• How to address talent retention, accountability, and scalability
• Why strategy and proper tools are key components in a successful SOC implementation
^ Cyber Security Trends: Aiming Ahead of the Target to Increase Security in 2017 - https://www.sans.org/reading-room/whitepapers/analyst/cyber-security-trends-aiming-target-increase-security-2017-37702
Is your infrastructure evolving so fast that your existing backup environment can’t cope? Join presenter Uli Wallscheid, HPE Technical Consultant and specialist for HPE Data Protector, to learn what HPE has to offer with Data Protector, including features and benefits you never knew were available.
You’ll also get a sneak preview of the next release version and will learn how it addresses the challenges of complexity, cost, and recoverability of today’s information-driven enterprises, with features such as:
• Added platforms and integrations
• New Virtualization features
• Security updates
• Storage integrations
The system of identity in use for over 40 years in the U.S. and much of the West evolved as a necessary adjunct to managing consumer credit. As with credit management, it is a risk-based system in which identity is inferred from the consistency of people's data.
Fintech – in general terms - is an enabler that is liberating speed, accuracy, and fidelity in many aspects of finance and payments and beyond. With it has come advances in biometric authentication that are successfully addressing account takeover and creating consumer identity, but are also driving a surge in synthetic identity as criminals seek to counter enroll directly in products, services, and access credentials.
Join Consultant and Risk Expert Richard Parry as he discusses:
- What synthetic identity is
- Why it is so insidious,
- Why it should be a priority for those seeking certainty and accuracy in fintech.
We cannot assume that an identity that passed a bank’s Know Your Customer (KYC) controls is accurate or real.
About Richard Parry:
Richard is a career risk manager whose work spanned the globe in service to Visa International, Citigroup, and JPMorgan Chase. Specifically, his corporate executive responsibilities were over-seeing fraud operations, fraud policy, customer authentication and identity management. Entrepreneurially, he co-founded Turnkey Risk Solutions, a Delaware-based risk management company that applied specialized analytical science to identify instances when synthetic identities perpetrated first-party fraud.
Currently, Richard’s Parry Advisory applies clear-thinking on identity, cyber and other risks. He works to enable clients to achieve desired outcomes through a structured methodology for discerning and factoring proofs over perception; knowledge-based decision-making instead of risk-based decision-making. Crucially, he eschews indignation for the thoughtful analysis of cause, effect, and remedy. Richard does not drink proverbial Kool-Aid.
How many hours do your sales and marketing teams waste on “Tyre Kicker” prospects that never buy anything?! Blue Sheep has found that organisations waste 80% of their total time chasing prospects that contribute 15-20% of the revenue and just 20% of their time on clients that provide 60-80%.
The issue happens time and again where a business is not able to identify these ‘Tyre Kickers’ early enough in the marketing-sales cycle.
Using customer insight and a unique process called ‘Money Mapping’, Jemma Hardyman – lead consultant for the Blue Sheep Data Services team – will discuss how all B2B organisations can utilize simple analytics and segmentation techniques to ensure you devote your marketing and sales efforts on the right prospects that are going to spend big and stay longer!
You will learn:
- Most beneficial ways of segmenting your database
- Case Study: the real ROI of segmentation
- How to discover more of your best customers
This webinar is run by Blue Sheep, a BlueVenn partner.