Recent enforcement actions by bank regulators are heightening the need to establish formal policies for third party vendor management. Financial institutions that use outside firms for all types of underwriting and other bank functions are ramping up their oversight of outside firms and for some, the data management burden is not insignificant. This timely event will focus specifically on how risk managers can develop effective policies for managing outside vendors for appraisals and environmental assessments.
EDR is pleased to host a webinar on this timely topic with Mitch Kreeger, a well-known subject matter expert on valuation, environmental and seismic risk, and regulatory compliance topics, will share his insights and advice on establishing an effective vendor management policy for appraisers and environmental professionals. Kreeger will explore the myriad ways that attendees can improve vendor management, from initial project bidding to vendor selection to monitoring vendors over time.
At this educational webinar, attendees will receive advice on managing relationships with appraisers and environmental consultants, including answers to the following:
• What should we consider in selecting the “right” vendor for the job?
• How do we find quality appraisers? EPs?
• What guidance should our institution be giving our appraisers and EPs?
• What criteria should we be using to grade vendors and monitor performance?
• How are banks facing today’s vendor management challenges?
This webinar will review the things that are missing in many of the people who want to become a computer security consultant. Many people start off at the Application Layer (layer 7), in this webinar we will discuss the importance of establishing a solid security foundation; we will look at the three main components to build this foundation. Those are:
During the webinar we will discuss mastering the power of the command line and the importance of understanding the traffic at the lowest level … the packet! We will also look at some simple but important protocol analysis techniques.
The webinar is an introduction to the Core Concepts course that was developed to provide those entering the fascinating world of computer security consulting, a foundation prior to embarking on this journey. The more solid foundation of skills you have the better you will be prepared as a consultant or security professional.
Your guide to starting out as a consultant, and what you need to build a portfolio career.Read more >
The CRO+Consultant+Sponsor Relationship: Collaborating to Ensure Sponsor and Client Success.Collaboration is the key to a successful consulting partnership. This webinar will focus on the responsibilities and perspectives of key stakeholders (Sponsor, consultant and CRO), how to make the most out of the Sponsor/consultant relationship, and key considerations when partnering with a contract research organization. Explore ways to optimize your consultant relationships to ensure success!Read more >
75 CLAS Consultants participated in an Independent Survey into Network Security. During this webcast you will learn:
- How CLAS Consultants percieve the threat of Network Hacking, as part of the Threat Lanscape
- What are the trend that they see that are contributing the increased threat levels surrounding the Security of Networks
- What types of remediation/ security technologies can be used to address the challenges
Would a hack on one Internet connected thermostat stop a nation? Maybe not, but imagine hundreds of connected devices being meddled with in order to cause havoc?
Join our IOT experts to discuss the real impact of an IOT device hack. Wieland Alge, GM EMEA at Barracuda Networks and Mark Harrison, Consultant at Pen Test Partners, will look into why cyber criminals are interested in hacking IOT devices and the true impact of such an attack to organisations. Join this webinar to learn:
• The true impact of an IOT hack
• Methods used by hackers
• Demos of IOT devices being hacked
• Major challenges in protecting smart cities
• How to mitigate these threats
While adoption of new technologies such as e-banking has created new channels to give customers a unique anytime anywhere banking convenience, the systems that banks depend on to deliver their services have multiplied and grown much more complex.
The effect of this increasing complexity has been to create more opportunities for fraudsters to gain access to critical systems, while at the same time making it harder for banks to have a clear overview of all the activity taking place on their systems. Cybercrime cost is projected to reach $2 trillion by 2019 (Juniper Research). Therefore, bridging the gap between adapting new digital technologies and keeping the systems secure has become one the biggest challenges for banks.
With this webinar this you will learn first-hand from NetGuardians’ Risk Consultant John Kiptum:
-How to detect e-banking fraud in real-time with dynamic profiling & pattern-based intelligence and prevent fraud before it happens.
-End-to-end risk mitigation approach; from data extraction to controls application, KRI Dashboard, and workflow.
-Solution examples in real-life
This webinar examines the common misconceptions and questions surrounding starting a SCV project. Jim Kelly, Principal Consultant at BlueVenn, takes you through the benefits, technicalities, improvements and ROI that an SCV could bring your organization.
Having consulted for some of the biggest names in the retail, leisure, finance and insurance industries, Jim provides an honest and fair representation of the benefits and complexities of building an SCV.
Have you ever wondered why so many organisations around the world embrace the Myers-Briggs Type Indicator® (MBTI) for individual, team and leadership development? In this 30-minute webcast, OPP’s senior consultants will reveal the power of understanding personality difference, exploring the impact it can have on engaging individuals and driving improvements in performance. Suitable for those who have no knowledge of the MBTI tool, as well as those who want to refresh their understanding of the benefits of knowing and applying your personality type at work.Read more >
Join Jeff Berg, Sr. Manager of Cyber Threat Intelligence, and Brad Bell, Mandiant Principal Consultant, as they share the role of cyber threat intelligence in strategic security consulting services and why services based on compliance-based best practices and industry standards may not be an effective way to protect your organization against a rapidly evolving threat landscape.
• The role cyber threat intelligence plays in strategic security consulting services
• Why services rooted in compliance-based best practices and industry standards aren’t effective
• Case studies where different types of intelligence added value to service portfolio
Each customer undertakes a unique journey, incorporating multiple channels and exhibiting different behaviors. Although this means huge potential for marketers to better engage with customers, actually tracking this behavior, and making use of the data, can seem like an insurmountable challenge for marketers.
In this webinar, BlueVenn Principal Consultant Jim Kelly will explore this topic in more detail and discuss concepts such as ‘cross-journey communication’ to manage the customer experience.
You will learn:
•New ways to monitor cost
Sometimes there is a mandate to delete large quantities of emails and files very quickly, either after litigation or simply because senior management gets fed up with too much electronic junk. When needing to delete a lot quickly, traditional “manage and let expire over time” approaches don’t work. On the other hand, blanket, delete-everything approaches can run afoul of record retention and legal requirements. What’s an organization to do?
About the Speaker:
Dan Elam is one of the nation’s best known consultants for information governance. As an early industry pioneer, he created the first needs analysis methodology and early cost justification models. Dan’s involvement has been in the design and procurement of some of the largest systems in the world. Today Dan helps Contoural clients develop business cases and establish strategic road maps for information governance. He is the former US Technical Expert to ISO and an AIIM Fellow.
Taking a “save everything forever” approach and employee hoarding of e-mails, files and other types of electronic documents are burying organizations under mountains of data, exposing them to privacy risks, increasing costs and risks of eDiscovery, as well as sapping productivity from employees who spend hours every week looking for information. Yet many company’s efforts at aggressively deleting electronic documents are either ineffective or worse, they have the unintended effect of driving “underground archiving” whereby employees save information in insecure locations.
Join us as we explore smart approaches to preventing employees from hoarding documents.
About the Speaker:
Kathryn Hilton, Vice President of Consulting for Contoural, has more than 20 years experience in records and information management, strategy consulting, and data storage technology. As a Contoural consultant and practice manager, Kathryn has developed methodologies for Records and Information Management organization design and for Change Management strategy, process, and content. In addition to leading Contoural teams in these areas, Kathryn assists clients with the globalization of their programs, and has visited client sites around the world for a detailed understanding of business and legal information management requirements.
Interview in partnership with BrightTALK, The Stack and Cloud Industry Forum
In this interview, Simon Ratcliffe, Principal Consultant & IT Evangelist, Ensono, shared with us ideas, recommendations and best practices on how to deliver DevOps in a legacy world.
Among topics discussed:
- Is DevOps for the legacy world?
- What are the challenges of DevOps for legacy systems?
- What makes the delivery of DevOps in a legacy world so different from the other worlds (start-up world, continuous delivery world, growth world etc?)
- Case examples in which legacy organisations thrived or failed from adopting DevOps
- And others
About the Speaker:
For publications see Simon's author page on the Digital Transformation People - http://www.thedigitaltransformationpeople.com/authors/simon-ratcliffe