25th May 2018 saw the introduction of the General Data Protection Regulation (GDPR). It's one month on from the 'Go Live' date and the opportunity continues for Consultants to work with the estimated 80%+ UK organisations that are not fully GDPR ready. In this webinar we will be covering:
What the opportunity is
The 5 key tips to win business
Who to target…you may be surprised
The 12 GDPR key areas to get right
What best practice looks like
Access to the GDPR tools, templates and techniques
David Marsh is an In Touch Networks consultant and also a director of OFG Limited, which has invested more than 4,000 hours of research and worked with more than 2,500 organisations (including the ICO regulator) implementing GDPR best practice. This will be your opportunity to ask your questions and discover how you can help your business as well as your clients business in becoming GDPR ready.
Recent enforcement actions by bank regulators are heightening the need to establish formal policies for third party vendor management. Financial institutions that use outside firms for all types of underwriting and other bank functions are ramping up their oversight of outside firms and for some, the data management burden is not insignificant. This timely event will focus specifically on how risk managers can develop effective policies for managing outside vendors for appraisals and environmental assessments.
EDR is pleased to host a webinar on this timely topic with Mitch Kreeger, a well-known subject matter expert on valuation, environmental and seismic risk, and regulatory compliance topics, will share his insights and advice on establishing an effective vendor management policy for appraisers and environmental professionals. Kreeger will explore the myriad ways that attendees can improve vendor management, from initial project bidding to vendor selection to monitoring vendors over time.
At this educational webinar, attendees will receive advice on managing relationships with appraisers and environmental consultants, including answers to the following:
• What should we consider in selecting the “right” vendor for the job?
• How do we find quality appraisers? EPs?
• What guidance should our institution be giving our appraisers and EPs?
• What criteria should we be using to grade vendors and monitor performance?
• How are banks facing today’s vendor management challenges?
This webinar will review the things that are missing in many of the people who want to become a computer security consultant. Many people start off at the Application Layer (layer 7), in this webinar we will discuss the importance of establishing a solid security foundation; we will look at the three main components to build this foundation. Those are:
During the webinar we will discuss mastering the power of the command line and the importance of understanding the traffic at the lowest level … the packet! We will also look at some simple but important protocol analysis techniques.
The webinar is an introduction to the Core Concepts course that was developed to provide those entering the fascinating world of computer security consulting, a foundation prior to embarking on this journey. The more solid foundation of skills you have the better you will be prepared as a consultant or security professional.
Your guide to starting out as a consultant, and what you need to build a portfolio career.Read more >
The CRO+Consultant+Sponsor Relationship: Collaborating to Ensure Sponsor and Client Success.Collaboration is the key to a successful consulting partnership. This webinar will focus on the responsibilities and perspectives of key stakeholders (Sponsor, consultant and CRO), how to make the most out of the Sponsor/consultant relationship, and key considerations when partnering with a contract research organization. Explore ways to optimize your consultant relationships to ensure success!Read more >
In this session, we'll discuss some of the concepts of containerization in the cloud, covering the following topics:
- What is Kubernetes and AKS?
- Container orchestration explained
- AKS vs ACS
- Deploying a Kubernetes Cluster into Azure using Terraform
- Using Terraform to manage Kubernetes clusters in Azure
- AKS pricing
About the speaker:
Robert is a DevOps Consultant with a background in network and systems administration. He has a wealth of experience across different sectors, from Charity & transport to Cloud Storage and ESP (Email Service Providers). Robert specialises in Cloud architecture, specifically Microsoft Azure and platforms built on Linux workloads. He has a passion for all things technology and a keen interested in finding ways, using technology, to change the world. He is also a strong advocate for collaboration between development and operations teams, automation & repeatability, open source, infrastructure as code and security best practices.
With the ever-increasing frequency and sophistication of security threats to organisations, business leaders need to have a comprehensive data security strategy to protect themselves. Information security practitioners have to think and plan beyond existing protection capabilities that are aimed at preventing threats only. Today's cyber security strategies need to protect an organisations mission critical assets in a way that is:
‒ balanced, providing a mixture of informative, preventative and detective security controls that complement each other
‒ comprehensive, providing protection before, during and after threat events materialise into security incidents
‒ end-to-end, covering the complete information life cycle.
This will enable organisations to match the protection provided with the sophistication of threats to such mission critical information assets. This webinar will look at past and present models and share ideas on how organisations can ‘future proof’ their strategies to combat next generation threats.
In particular in this webinar, Nick Frost, Principal Consultant at the ISF will discuss what actions can be taken to identify your most critical information assets, and how a modern day cyber security model needs to focus on prevention and detection of a data breach, and how to respond to a breach in order to reduce damage to brand and reputation.
How to make your staff your first and last line of defence.
Learn how to:
•Identify your enemy and their tactics
•Discover why technological defences will lose to hackers
•Learn how to make staff genuinely care about security
About Rob Shapland BSc (Hons) OSCP OSWP CRT Principal Cyber Security Consultant, First Base Technologies
Rob Shapland is an ethical hacker with 9 years’ experience conducting penetration tests for hundreds of organisations, from small businesses to major international organisations.
He specialises in simulating advanced cyber attacks against corporate networks, combining technical attacks with his other hobby of dressing up and tricking his way into company headquarters using social engineering techniques.
He is also a regular speaker at events and conferences around Europe, and has appeared on both BBC and ITV as a cyber security adviser. He holds qualifications from SANS, Offensive Security and CREST, and has been trained in social engineering techniques by Chris Hadnagy, one of the world's leading practitioners and researchers.
75 CLAS Consultants participated in an Independent Survey into Network Security. During this webcast you will learn:
- How CLAS Consultants percieve the threat of Network Hacking, as part of the Threat Lanscape
- What are the trend that they see that are contributing the increased threat levels surrounding the Security of Networks
- What types of remediation/ security technologies can be used to address the challenges
The expectation from the start of 2017 – that we hadn’t seen the back of ransomware – was justified. 2017 was plagued with global attacks such as Petya, WannaCry, Bad Rabbit and many others. Unfortunately, 2018 could be even worse.
With ransomware continuously developing new delivery techniques, organisations must learn how to prepare and protect themselves from the threat of ransomware, but how can they do this?
In this webinar, Nick Frost, Principal Consultant at the ISF, will explore the latest threats in ransomware and what organisations can do to minimise vulnerabilities to reduce risks of an attack.
About the presenter:
Nick is currently the Principal Researcher for the Information Security Forum (ISF) Ltd. He has more than 15 years’ experience designing and implementing a risk-based approach to securing information. He has developed leading solutions for evaluating risk across both internal and supplier environments.
Are your employees happy? Have you asked them recently? You should. People who are happy at work are more productive. When rolling out agile in an organization, one of the key metrics our agile consultants and coaches encourage companies to measure is employee happiness.
What makes people happy? Being a part of a purpose-driven organization with an outcome-oriented culture, knowing the work they do is aligned to the overall goals and strategies of the company.
During this webinar, Longda Yin, Principal Agile Consultant and SAFe® Program Consultant, will discuss:
•How agile allows for employees to understand the work they're doing matters
•How agile and happiness in the work place are connected
•How to shift (or expand) to an agile culture
Join us to learn more!
September’s White-Hat File comes from licensed attorney and Risk and Compliance Senior Consultant John Sharp.
In this 15-minute webinar, you’ll learn how cybersecurity compliance regulations aren’t the catchall you need to make sure your network is secure—as well as the most common pitfalls organizations face when trying to stay compliant.
Get behind-the-scenes’ insight into how to migrate data from SAN, NAS or tape to an Object-Based Storage solution. John Bell, Sr. Consultant, and Eric Dey, Director of Product Management, will share their experience from hundreds of successful object storage implementations. They will explain the ins and outs of the data migration process and share best practices to help you move from a limited traditional storage approach to the new, cost-effective, limitless storage paradigm of object storage.Read more >
We are truly in the 'age of containers' as developers continue the rapid adoption of containers and their associated orchestration tooling to improve delivery times of working software. This change in development methodology presents challenges to the AppSec team who have to understand this new paradigm.
Join Colin Domoney, Senior Principal Transformation Consultant @ CA Technologies, for this live webinar where he will provide an introduction into generic container toolchains, guidance on how to leverage and embed your existing security tooling investment into a container centric environment. As well as how to select and evaluate container specific tooling.
Practical advice will be given on how to employ the CIS Benchmark and how to ensure general best practices are applied in securing and hardening the container environments. The participant should come away with a working knowledge of how containers are used, built and deployed; and practical ideas on how to improve their container security posture.
This webinar is part of BrightTALK's Masterclass series.
Are you holding back from achieving your goals and dreams?
Do you want to be and feel more confident?
Are you ready to make a change and take action to becoming confident?
If the answer to all three questions is YES, this confidence webinar is for you! Helena is delighted to be hosting her confidence for women webinar on September 14th. She hopes you can join her and other women, who are ready to make the changes to unlock their best self.
By registering for the event, you receive a workbook to accompany the webinar allowing you to take practical steps as you learn, PLUS a free e-book on confidence. If you can’t join live, you’ll receive a recording of the webinar…so you don’t miss out.
In the meantime, Helena invites you to join her closed facebook group to meet likeminded women who are working on their confidence, career and business goals: https://www.facebook.com/groups/makeithappenwithhelena
Helena Stone is a Change Management Consultant and mentor for women. She supports both organisations and individuals who know they need to change to reach the performance improvements they're looking for…but they can't quite figure out how to do it.
As your business and product data complexity grows, so too may your need for an enhanced PIM system that accounts for numerous operating units, separate companies, global operations, and more.
How do you judge whether you are ready to jump from your homegrown solution? And if you’re ready to make the jump, what is the best path to ensure that you transition from one system to another successfully?
In this session you will learn:
* The milestones that signal your readiness to take on a commercial PIM
* Best practices when making the transition to a commercial PIM
* How to align your PIM strategy to a logical data model
Alison Tran, EIS, Client Partner, brings over 14 years of business and technology consulting experience in technology adoption, software implementation, organizational redesign, change management and process reengineering.
Chantal Schweizer, EIS, Principal Consultant, a senior information organization professional with over 10 years experience in product information and taxonomy design.
For better – and sometimes for worse - technology permeates through an individual’s life. But can technology applications help keep people on the “right track”? Chisom Izu is currently a consultant at one of the top private healthcare companies in the world, placed in his first tech role after undertaking a specialist graduate course at Sparta Global’s technology and business training Academy. Despite a criminal record that threatened to derail his future, Chisom has succeeded in starting and sustaining a successful career in tech, while driving change amongst young people. In this talk Chisom will discuss his journey into tech, how he landed his first tech job and introduce the Rytrack Foundation – an organsiation he founded to prevent young people from being derailed and making the wrong choices. Appreciating the power of technology for change, Rytrack Foundation’s Facebook Messenger Chatbot is the latest tool developed to assist young people in staying on the right track (Rytrack).
The Chatbot will provide critical development information to parents, guardians and leaders responsible for the welfare of young people, while introducing the concept of object-oriented programming – arguably the future of app development. From derailment to getting back on the right track, this talk will highlight the whirlwind that often precedes the calm and how technology applications will prove to be a groundbreaking resource in the successful progression of young people.