25th May 2018 saw the introduction of the General Data Protection Regulation (GDPR). It's one month on from the 'Go Live' date and the opportunity continues for Consultants to work with the estimated 80%+ UK organisations that are not fully GDPR ready. In this webinar we will be covering:
What the opportunity is
The 5 key tips to win business
Who to target…you may be surprised
The 12 GDPR key areas to get right
What best practice looks like
Access to the GDPR tools, templates and techniques
David Marsh is an In Touch Networks consultant and also a director of OFG Limited, which has invested more than 4,000 hours of research and worked with more than 2,500 organisations (including the ICO regulator) implementing GDPR best practice. This will be your opportunity to ask your questions and discover how you can help your business as well as your clients business in becoming GDPR ready.
Recent enforcement actions by bank regulators are heightening the need to establish formal policies for third party vendor management. Financial institutions that use outside firms for all types of underwriting and other bank functions are ramping up their oversight of outside firms and for some, the data management burden is not insignificant. This timely event will focus specifically on how risk managers can develop effective policies for managing outside vendors for appraisals and environmental assessments.
EDR is pleased to host a webinar on this timely topic with Mitch Kreeger, a well-known subject matter expert on valuation, environmental and seismic risk, and regulatory compliance topics, will share his insights and advice on establishing an effective vendor management policy for appraisers and environmental professionals. Kreeger will explore the myriad ways that attendees can improve vendor management, from initial project bidding to vendor selection to monitoring vendors over time.
At this educational webinar, attendees will receive advice on managing relationships with appraisers and environmental consultants, including answers to the following:
• What should we consider in selecting the “right” vendor for the job?
• How do we find quality appraisers? EPs?
• What guidance should our institution be giving our appraisers and EPs?
• What criteria should we be using to grade vendors and monitor performance?
• How are banks facing today’s vendor management challenges?
This webinar will review the things that are missing in many of the people who want to become a computer security consultant. Many people start off at the Application Layer (layer 7), in this webinar we will discuss the importance of establishing a solid security foundation; we will look at the three main components to build this foundation. Those are:
During the webinar we will discuss mastering the power of the command line and the importance of understanding the traffic at the lowest level … the packet! We will also look at some simple but important protocol analysis techniques.
The webinar is an introduction to the Core Concepts course that was developed to provide those entering the fascinating world of computer security consulting, a foundation prior to embarking on this journey. The more solid foundation of skills you have the better you will be prepared as a consultant or security professional.
Your guide to starting out as a consultant, and what you need to build a portfolio career.Read more >
The CRO+Consultant+Sponsor Relationship: Collaborating to Ensure Sponsor and Client Success.Collaboration is the key to a successful consulting partnership. This webinar will focus on the responsibilities and perspectives of key stakeholders (Sponsor, consultant and CRO), how to make the most out of the Sponsor/consultant relationship, and key considerations when partnering with a contract research organization. Explore ways to optimize your consultant relationships to ensure success!Read more >
In this session, we'll discuss some of the concepts of containerization in the cloud, covering the following topics:
- What is Kubernetes and AKS?
- Container orchestration explained
- AKS vs ACS
- Deploying a Kubernetes Cluster into Azure using Terraform
- Using Terraform to manage Kubernetes clusters in Azure
- AKS pricing
About the speaker:
Robert is a DevOps Consultant with a background in network and systems administration. He has a wealth of experience across different sectors, from Charity & transport to Cloud Storage and ESP (Email Service Providers). Robert specialises in Cloud architecture, specifically Microsoft Azure and platforms built on Linux workloads. He has a passion for all things technology and a keen interested in finding ways, using technology, to change the world. He is also a strong advocate for collaboration between development and operations teams, automation & repeatability, open source, infrastructure as code and security best practices.
With the ever-increasing frequency and sophistication of security threats to organisations, business leaders need to have a comprehensive data security strategy to protect themselves. Information security practitioners have to think and plan beyond existing protection capabilities that are aimed at preventing threats only. Today's cyber security strategies need to protect an organisations mission critical assets in a way that is:
‒ balanced, providing a mixture of informative, preventative and detective security controls that complement each other
‒ comprehensive, providing protection before, during and after threat events materialise into security incidents
‒ end-to-end, covering the complete information life cycle.
This will enable organisations to match the protection provided with the sophistication of threats to such mission critical information assets. This webinar will look at past and present models and share ideas on how organisations can ‘future proof’ their strategies to combat next generation threats.
In particular in this webinar, Nick Frost, Principal Consultant at the ISF will discuss what actions can be taken to identify your most critical information assets, and how a modern day cyber security model needs to focus on prevention and detection of a data breach, and how to respond to a breach in order to reduce damage to brand and reputation.
How to make your staff your first and last line of defence.
Learn how to:
•Identify your enemy and their tactics
•Discover why technological defences will lose to hackers
•Learn how to make staff genuinely care about security
About Rob Shapland BSc (Hons) OSCP OSWP CRT Principal Cyber Security Consultant, First Base Technologies
Rob Shapland is an ethical hacker with 9 years’ experience conducting penetration tests for hundreds of organisations, from small businesses to major international organisations.
He specialises in simulating advanced cyber attacks against corporate networks, combining technical attacks with his other hobby of dressing up and tricking his way into company headquarters using social engineering techniques.
He is also a regular speaker at events and conferences around Europe, and has appeared on both BBC and ITV as a cyber security adviser. He holds qualifications from SANS, Offensive Security and CREST, and has been trained in social engineering techniques by Chris Hadnagy, one of the world's leading practitioners and researchers.
75 CLAS Consultants participated in an Independent Survey into Network Security. During this webcast you will learn:
- How CLAS Consultants percieve the threat of Network Hacking, as part of the Threat Lanscape
- What are the trend that they see that are contributing the increased threat levels surrounding the Security of Networks
- What types of remediation/ security technologies can be used to address the challenges
Join Sr. Consultant John Bell and UI Engineer Brian Guetzlaff for a tour and demo using the Swarm Object Storage user interface (UI) to manage a storage cluster. They will also provide insight into the management API that underpins the user interface and discuss the capabilities of the platform.Read more >
You want to benefit from cloud. You want to benefit from Agile, ITSM and DevOps. You want to save money. You create a programme and move your services and applications to some cloudy world. Whether it is hybrid or all someone else’s have you considered the impacted on your overall processes, all of your internal staff, your customers, regulators and suppliers?
We find that many consider some of these but few look at the entire spectrum. Cloud is a great thing, especially when viewed from the lens of integrating your service with great management (SIAM). Please join Steve Morgan, Director SynaidIT and SIAM-ITSM coach & mentor, and Daniel Breston, Principal Consultant Virtual Clarity & DevOps ITSM blender, as we discuss (argue) the good, bad, great of SIAM in the Cloudy world.
The expectation from the start of 2017 – that we hadn’t seen the back of ransomware – was justified. 2017 was plagued with global attacks such as Petya, WannaCry, Bad Rabbit and many others. Unfortunately, 2018 could be even worse.
With ransomware continuously developing new delivery techniques, organisations must learn how to prepare and protect themselves from the threat of ransomware, but how can they do this?
In this webinar, Nick Frost, Principal Consultant at the ISF, will explore the latest threats in ransomware and what organisations can do to minimise vulnerabilities to reduce risks of an attack.
About the presenter:
Nick is currently the Principal Researcher for the Information Security Forum (ISF) Ltd. He has more than 15 years’ experience designing and implementing a risk-based approach to securing information. He has developed leading solutions for evaluating risk across both internal and supplier environments.
When security flaws appear in software, security teams and developers often scramble to find someone to blame. Perhaps they have not considered the possibility that security flaws might be a naturally occurring aspect of the software development life cycle. During this webinar, hear one of CA Veracode’s security consultants present this aspect of software development with an analysis of scan data over the past six years, looking primarily at how often SQL injection shows up on the first scan of an application. We will examine how this pattern occurs across organizations and what it means for flaw introduction rates in general. Viewers will come away with clear steps on how security and development teams can work together to manage security flaws going forward.Read more >
Creating an organization focused on employee happiness is a major step to retaining your employee base, motivating them, and increasing engagement (saving money!). To do this, many organizations are implementing agile across the business and creating a purpose-driven, outcome-oriented culture.
In this webinar, Longda Yin, Principal Agile Consultant at CA Technologies, will give clear examples of how you can use agile to influence happiness, specifically because agile delivers work with a purpose.
During this webinar, Longda will discuss:
-Why implementing agile will give your employees a clearer sense of purpose
-How to implement agile correctly, using an example
-What to expect in terms of culture, after implementing agile and giving work purpose
Massive scalability is one thing, but what if you want to run Object-Based Storage for a smaller shop? Can you start with a small hardware investment and run object-based storage on just one server? John Bell, Sr. Consultant, and Jamshid Afshar, Caringo Engineer, will explain how you can store, manage, search and deliver data with just one server, while maintaining the ability to scale out by simply plugging in additional servers as your data storage needs grow. They will explain how this “pay-as-you-grow” model can benefit organizations as they start to outgrow traditional SAN, NAS and Tape storage solutions.Read more >
Great customer self-service enables customers to quickly locate the information they need, using a vocabulary they understand, in real-time.
In our upcoming webinar, learn how to create better self-service experiences by combining structured content and metadata management.
Join Bob St. Clair (Managing Consultant, Smartlogic) and Chip Gettinger (VP Global Solutions Consulting, SDL) to learn how:
•SDL Tridion Docs structured content management integrates with Smartlogic Semaphore to manage, tag and serve content across the enterprise.
•Product content is managed and reused across departments and groups.
•Customers and agents can quickly find the information they need when they need it.
With SDL and Smartlogic, users can find the information they need, using a vocabulary they understand to save time and improve customer satisfaction.
Presentation by Richard P. Hudson, CISSP, Principal IT Consultant, IT Architecture, Applied Technology Research, msg systemsRead more >
With the whirlwind pace of artificial intelligence (AI) and deep learning technology, many enterprises are challenged with how to advance new AI projects from proof of concept to production. Join the webcast “Drive Disruptive Innovation at Scale with AI” and find out how you can enable a secure and smooth flow of data for your AI workflows, from edge to core to cloud.
You will hear directly from three leading experts: Monty Barlow from Cambridge Consultants, Ritu Jyoti from IDC, and Santosh Rao from NetApp.
They will discuss how you can:
•Build a successful deep learning pipeline, whether in the cloud or on-premises
•Discover lessons learned from industry case studies, including automotive, retail, and healthcare
•Scale infrastructure to keep pace with your data-hungry AI applications