Hear from Phil Birch, a recent success story at In Touch Networks on the challenges of beginning your consultancy career.Read more >
25th May 2018 saw the introduction of the General Data Protection Regulation (GDPR). It's one month on from the 'Go Live' date and the opportunity continues for Consultants to work with the estimated 80%+ UK organisations that are not fully GDPR ready. In this webinar we will be covering:
What the opportunity is
The 5 key tips to win business
Who to target…you may be surprised
The 12 GDPR key areas to get right
What best practice looks like
Access to the GDPR tools, templates and techniques
David Marsh is an In Touch Networks consultant and also a director of OFG Limited, which has invested more than 4,000 hours of research and worked with more than 2,500 organisations (including the ICO regulator) implementing GDPR best practice. This will be your opportunity to ask your questions and discover how you can help your business as well as your clients business in becoming GDPR ready.
Recent enforcement actions by bank regulators are heightening the need to establish formal policies for third party vendor management. Financial institutions that use outside firms for all types of underwriting and other bank functions are ramping up their oversight of outside firms and for some, the data management burden is not insignificant. This timely event will focus specifically on how risk managers can develop effective policies for managing outside vendors for appraisals and environmental assessments.
EDR is pleased to host a webinar on this timely topic with Mitch Kreeger, a well-known subject matter expert on valuation, environmental and seismic risk, and regulatory compliance topics, will share his insights and advice on establishing an effective vendor management policy for appraisers and environmental professionals. Kreeger will explore the myriad ways that attendees can improve vendor management, from initial project bidding to vendor selection to monitoring vendors over time.
At this educational webinar, attendees will receive advice on managing relationships with appraisers and environmental consultants, including answers to the following:
• What should we consider in selecting the “right” vendor for the job?
• How do we find quality appraisers? EPs?
• What guidance should our institution be giving our appraisers and EPs?
• What criteria should we be using to grade vendors and monitor performance?
• How are banks facing today’s vendor management challenges?
This webinar will review the things that are missing in many of the people who want to become a computer security consultant. Many people start off at the Application Layer (layer 7), in this webinar we will discuss the importance of establishing a solid security foundation; we will look at the three main components to build this foundation. Those are:
During the webinar we will discuss mastering the power of the command line and the importance of understanding the traffic at the lowest level … the packet! We will also look at some simple but important protocol analysis techniques.
The webinar is an introduction to the Core Concepts course that was developed to provide those entering the fascinating world of computer security consulting, a foundation prior to embarking on this journey. The more solid foundation of skills you have the better you will be prepared as a consultant or security professional.
Your guide to starting out as a consultant, and what you need to build a portfolio career.Read more >
The CRO+Consultant+Sponsor Relationship: Collaborating to Ensure Sponsor and Client Success.Collaboration is the key to a successful consulting partnership. This webinar will focus on the responsibilities and perspectives of key stakeholders (Sponsor, consultant and CRO), how to make the most out of the Sponsor/consultant relationship, and key considerations when partnering with a contract research organization. Explore ways to optimize your consultant relationships to ensure success!Read more >
How to make your staff your first and last line of defence.
Learn how to:
•Identify your enemy and their tactics
•Discover why technological defences will lose to hackers
•Learn how to make staff genuinely care about security
About Rob Shapland BSc (Hons) OSCP OSWP CRT Principal Cyber Security Consultant, First Base Technologies
Rob Shapland is an ethical hacker with 9 years’ experience conducting penetration tests for hundreds of organisations, from small businesses to major international organisations.
He specialises in simulating advanced cyber attacks against corporate networks, combining technical attacks with his other hobby of dressing up and tricking his way into company headquarters using social engineering techniques.
He is also a regular speaker at events and conferences around Europe, and has appeared on both BBC and ITV as a cyber security adviser. He holds qualifications from SANS, Offensive Security and CREST, and has been trained in social engineering techniques by Chris Hadnagy, one of the world's leading practitioners and researchers.
75 CLAS Consultants participated in an Independent Survey into Network Security. During this webcast you will learn:
- How CLAS Consultants percieve the threat of Network Hacking, as part of the Threat Lanscape
- What are the trend that they see that are contributing the increased threat levels surrounding the Security of Networks
- What types of remediation/ security technologies can be used to address the challenges
The expectation from the start of 2017 – that we hadn’t seen the back of ransomware – was justified. 2017 was plagued with global attacks such as Petya, WannaCry, Bad Rabbit and many others. Unfortunately, 2018 could be even worse.
With ransomware continuously developing new delivery techniques, organisations must learn how to prepare and protect themselves from the threat of ransomware, but how can they do this?
In this webinar, Nick Frost, Principal Consultant at the ISF, will explore the latest threats in ransomware and what organisations can do to minimise vulnerabilities to reduce risks of an attack.
About the presenter:
Nick is currently the Principal Researcher for the Information Security Forum (ISF) Ltd. He has more than 15 years’ experience designing and implementing a risk-based approach to securing information. He has developed leading solutions for evaluating risk across both internal and supplier environments.
It’s no secret that open source security is a hotly debated topic. However it’s important to keep in mind that commercially licensed third-party software carries much of the same risk as open source software. While helping a customer attain a Verified certification, one of CA Veracode’s application security consultants uncovered a cross-site scripting flaw in the popular Telerik Reporting project. The flaw has since been patched but it’s these types of unknown risks that organizations take when introducing third party code into their environment.
During this talk, you’ll hear from Matt Runkle, the AppSec Consultant who uncovered the XSS flaw, to get insight into the mind of a hacker and hear how vulnerabilities like XSS are commonly exploited in third party software and how you can take action to prevent attacks like this in your own environment.
Our third White-Hat File comes from Anton Abaya, CISA, PCI QSA, Senior Consultant in Accudata’s Risk and Compliance practice.
In this 15-minute webinar, he’ll describe the most effective ways he’s used social engineering and phishing techniques to crack into companies, as well as the best practices you can implement to ensure these attacks don’t work on your business.
Register for the August edition of the White-Hat Files here: https://www.brighttalk.com/webcast/16347/330367
Last year’s crypto-boom has driven huge interest and aggressive development of enterprise applications for blockchain technology, particularly in financial services. To date, however, the industry has yet to see meaningful production implementations, leaving many skeptical of blockchain as a solution still looking for a problem.
David Lee, a technology & digital consultant for BCS Consulting, argues that projects seeking enterprise adoption need to move past technology questions and look more closely at how blockchain solutions are governed. Drawing on his experience working with several blockchain initiatives, bank innovation teams and startups, he outlines the issues with existing governance models and the criteria that blockchain projects need to meet in order to be viable at enterprise production scale.
Metrics are everywhere and understanding how to use them is essential to the effective and responsible use of them. Katy McKen, Head of Research Information at University of Bath and Matt Walker, Senior Customer Consultant will discuss the responsible use of research metrics and their role in decision making processes.
Join us on June 27 where we will discuss:
• The UK landscape and where metrics are already used in universities
• Why it is important to develop a set of principles around responsible use of metrics
• Experience of getting and maintaining senior academic buy-in and support
Configuration Management Database (CMDB) conjures thoughts of Excel (manual entry—blah); it’s so cumbersome. But what if you could make it easier—automated, cloud based—and proactively eliminate service outages?
Join our 15-minute webinar with ServiceNow Advisory Solutions Consultant Mike Bledsoe as he discusses common-use cases that prove the value in effective CMDB with ServiceNow’s Discovery solution. We’ve already started seeing how this is changing IT departments’ lives—there’s a reason why ServiceNow is Forbes’ #1 most innovative organization in the nation.
I remember when virtual or cloud became the scary marketing words for any Operations or Infrastructure or ITSM person. My role is going, my skills won’t be needed. Our processes will break. We can’t go that fast!!!
Now years later – we have seen that what we do underpins what the organisations gets when they adopt and adapt to cloud based services. Let’s see why this happened and discuss how we can continue to be the innovation side of technology just like we have been all along.
Join me, Daniel Breston, to discuss how ITSM is relevant in the world of cloud or fast technology services delivered by multiple suppliers or technologies.
About Daniel Breston;
Daniel is a Principal Consultant for Virtual Clarity leading the operating model practices incorporating DevOps, ITSM, Agile Ops and leanIT Leadership. Daniel is a frequent speaker for BrightTalk, the British Computer Society, SITS, HDI or other conferences. Daniel is also a contributor to the VeriSM and SIAM Body of Knowledge acts as a mentor or coach for leaders interested in getting the best from technology services.
To help organizations better understand the benefits and costs associated with InfiniBox, INFINIDAT commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study in April 2018. Forrester interviewed current InfiniBox customers across several industries and geographies. With the information gathered, Forrester uncovered some remarkable results based on a composite organization.
The study revealed the following business benefits:
•125% Return on Investment (ROI)
•A total benefit of $18.4 million over three years
•An investment with a very positive Net Present Value (NPV) of $10.2M
•Downtime cost savings of over $1.1 million
•Payback in less than six months
Bob Cormier - VP & PRINCIPAL CONSULTANT, FORRESTER CONSULTING
Bob is a Vice President and Principal Consultant in Forrester's Total Economic Impact™ (TEI) service. He is a leading expert on deriving business value from technology investments, specializing in advising clients on the TEI framework — services that help organizations understand the overall financial value of IT strategies and investments.
Security leaders must choose appropriate tools and build a culture that does not inhibit the development pipeline but supports it. In this webinar, Ultimate Guide to Building Security into CI/CD, Olli Jarva, Managing Consultant and Solution Architect, Synopsys Asia Pacific, outlines how security teams can work within a Continuous Delivery or Continuous Deployment model by building security into operational processes and an integrated, Continuous Integration toolchain. This integrated software security strategy is known as “Continuous Security.”Read more >
Cyber breaches that result in data loss are often accompanied by heavy costs—some costs are obvious, while others are unexpected. Attacks not only places a financial strain on organizations, but can also hinder their ability to conduct normal business operations, which affects sales transactions and market reputations.
Join Jon Horner, Senior Consultant, Mandiant, a FireEye company and featured speaker, Katherine Keefe, Head of Beazley Breach Response Services, Beazley Group as they break down the costs of a breach, detail each cost, and explain how to estimate the business impact of each line item. After this session, you’ll be able to educate your leaders on:
• Common costs of a breach, which involve number of records affected, remediation efforts, revenue loss and reputational backlash
• Processes to estimate each type of cost
• Risk mitigation activities to help reduce future costs