Recent enforcement actions by bank regulators are heightening the need to establish formal policies for third party vendor management. Financial institutions that use outside firms for all types of underwriting and other bank functions are ramping up their oversight of outside firms and for some, the data management burden is not insignificant. This timely event will focus specifically on how risk managers can develop effective policies for managing outside vendors for appraisals and environmental assessments.
EDR is pleased to host a webinar on this timely topic with Mitch Kreeger, a well-known subject matter expert on valuation, environmental and seismic risk, and regulatory compliance topics, will share his insights and advice on establishing an effective vendor management policy for appraisers and environmental professionals. Kreeger will explore the myriad ways that attendees can improve vendor management, from initial project bidding to vendor selection to monitoring vendors over time.
At this educational webinar, attendees will receive advice on managing relationships with appraisers and environmental consultants, including answers to the following:
• What should we consider in selecting the “right” vendor for the job?
• How do we find quality appraisers? EPs?
• What guidance should our institution be giving our appraisers and EPs?
• What criteria should we be using to grade vendors and monitor performance?
• How are banks facing today’s vendor management challenges?
This webinar will review the things that are missing in many of the people who want to become a computer security consultant. Many people start off at the Application Layer (layer 7), in this webinar we will discuss the importance of establishing a solid security foundation; we will look at the three main components to build this foundation. Those are:
During the webinar we will discuss mastering the power of the command line and the importance of understanding the traffic at the lowest level … the packet! We will also look at some simple but important protocol analysis techniques.
The webinar is an introduction to the Core Concepts course that was developed to provide those entering the fascinating world of computer security consulting, a foundation prior to embarking on this journey. The more solid foundation of skills you have the better you will be prepared as a consultant or security professional.
Your guide to starting out as a consultant, and what you need to build a portfolio career.Read more >
The CRO+Consultant+Sponsor Relationship: Collaborating to Ensure Sponsor and Client Success.Collaboration is the key to a successful consulting partnership. This webinar will focus on the responsibilities and perspectives of key stakeholders (Sponsor, consultant and CRO), how to make the most out of the Sponsor/consultant relationship, and key considerations when partnering with a contract research organization. Explore ways to optimize your consultant relationships to ensure success!Read more >
How to make your staff your first and last line of defence.
Learn how to:
•Identify your enemy and their tactics
•Discover why technological defences will lose to hackers
•Learn how to make staff genuinely care about security
About Rob Shapland BSc (Hons) OSCP OSWP CRT Principal Cyber Security Consultant, First Base Technologies
Rob Shapland is an ethical hacker with 9 years’ experience conducting penetration tests for hundreds of organisations, from small businesses to major international organisations.
He specialises in simulating advanced cyber attacks against corporate networks, combining technical attacks with his other hobby of dressing up and tricking his way into company headquarters using social engineering techniques.
He is also a regular speaker at events and conferences around Europe, and has appeared on both BBC and ITV as a cyber security adviser. He holds qualifications from SANS, Offensive Security and CREST, and has been trained in social engineering techniques by Chris Hadnagy, one of the world's leading practitioners and researchers.
75 CLAS Consultants participated in an Independent Survey into Network Security. During this webcast you will learn:
- How CLAS Consultants percieve the threat of Network Hacking, as part of the Threat Lanscape
- What are the trend that they see that are contributing the increased threat levels surrounding the Security of Networks
- What types of remediation/ security technologies can be used to address the challenges
The expectation from the start of 2017 – that we hadn’t seen the back of ransomware – was justified. 2017 was plagued with global attacks such as Petya, WannaCry, Bad Rabbit and many others. Unfortunately, 2018 could be even worse.
With ransomware continuously developing new delivery techniques, organisations must learn how to prepare and protect themselves from the threat of ransomware, but how can they do this?
In this webinar, Nick Frost, Principal Consultant at the ISF, will explore the latest threats in ransomware and what organisations can do to minimise vulnerabilities to reduce risks of an attack.
About the presenter:
Nick is currently the Principal Researcher for the Information Security Forum (ISF) Ltd. He has more than 15 years’ experience designing and implementing a risk-based approach to securing information. He has developed leading solutions for evaluating risk across both internal and supplier environments.
Following on from our successful event, Becoming a Consultant: Where to Begin, Niall Foster will be taking you through the next stage of becoming a successful consultant.Read more >
Consultant Corner - Beta WebcastRead more >
Investment consultants advise on the investment practices of trillions of dollars worldwide. They are a recognised source of authority and knowledge. However, most consultants and their asset owner clients are failing to consider environmental, social and governance (ESG) issues in investment practice – despite a growing evidence base that demonstrates the financial materiality of ESG issues to portfolio value.
There currently seems little commercial imperative for investment consultants to extend the coverage of ESG integrated services among their clients. Nor do we see pension schemes demanding ESG integrated services from their consultants. In too many cases, consultants and their clients simply don’t talk about ESG issues.
In this session, we will discuss the barriers and solutions with a view to maximising the global SRI opportunity.
Buying a new vehicle can be a personal and significant purchase. Often starting with an aspirational poster on a bedroom wall, the car-buying journey is one that could take weeks, if not years. That’s why delivering the most relevance and tapping into those emotions is so important for automotive marketers.
BlueVenn Consultant Director Jeremy Bender will discuss how IM Group, distributors for Subaru, use pioneering personalization approaches to deliver marketing content to the right person at the most opportune moments to see automotive dreams become reality.
During this webinar, you will learn:
- How Subaru used a closed loop marketing methodology to revolutionize the customer experience
- The importance of relevance in a marketing echo system
- How personalization helped increase purchase interest by a third
What are the lessons learned from the biggest ransomware attacks to date (Wannacry, NotPetya)? How are organizations preparing against the next big attack?
Join top security experts for this interactive Q&A discussion on:
- Trends in ransomware attacks
- Backups, patches and other ways to protect your data
- How to bolster your organization's security culture
- Other threats on the horizon
- Nick Frost, Principal Consultant, Information Security Forum (ISF)
- Raja Mukerji, Co-Founder and President, ExtraHop
- Patrick Grillo, Senior Director Solutions Marketing, Fortinet
- Rob McGovern, Technical Product Manager, LogRhythm
The session will be streamed LIVE from London from the Infosecurity Europe conference.
Security leaders must choose appropriate tools and build a culture that does not inhibit the development pipeline but supports it. In this webinar, Ultimate Guide to Building Security into CI/CD, Olli Jarva, Managing Consultant and Solution Architect, Synopsys Asia Pacific, outlines how security teams can work within a Continuous Delivery or Continuous Deployment model by building security into operational processes and an integrated, Continuous Integration toolchain. This integrated software security strategy is known as “Continuous Security.”Read more >
With the shift to more agile-based development cycles, the PMO and her counterparts in Finance are faced with new challenges properly tracking capital and operational expenditures in accordance with the law. Sonja Furneaux, a project portfolio consultant with long experience in financial management, will guide us through the obstacles and show us how to set up and run project finances aligned both with latest Agile methodologies and accounting policies.Read more >
Having a consistent tone of voice for your business doesn’t only make your brand more engaging, it will also help you with your marketing - from the type of posts that will go down well to what language to use on your website.
Cara Bendon is a brand consultant with 10 years experience during which she has worked across over 40 different brands, ranging from startups to household names. In this webinar she will guide you through how to identify an authentic tone of voice for your business, and how to put it into action.
Expect to come away with a defined tone of voice for your brand - notepads at the ready!
Elasticsearch is a distributed, RESTful search and analytics engine that can be used with object storage to enhance searchability with metadata, enabling you to search billions of files ad hoc with "Google-like" search capabilities, without the rigid structure of relational databases and file systems. Caringo Senior Consultant John Bell and Caringo Engineer Jamshid Afshar take an in-depth look at best practices for using Elasticsearch with object storage and demonstrate use of Elasticsearch with Caringo Swarm Object Storage in this webinar.Read more >
Anne Kootstra, Siebel CRM Consultant at Accenture, explains how Application Release Automation has been used to shorten downtime of Siebel and increase quality and stability at a huge telecom provider in the Netherlands.Read more >
Learn how to discover more about your data and uncover hidden issues in data quality which can impact on business insights. In this webinar, we’ll take a look at why data quality is important, what we mean by “poor data” and the impact it can have on the business. Trillium Discovery Center is an easy-to-use, browser-based tool, that can really help in understanding and addressing data quality, and we will walk through key features which can help uncover issues you may run into, as well as different options to correct them.
Our presenter, Davinity Powis, is a consultant specialising in Data Quality, Data Integration and Big Data. With 16 years’ practical experience in data marketing prior to joining Synsort, having run her own database marketing agency and as Group Head of Data & Insight, she’s passionate about making data understandable, and exciting!