Johnson Controls delivers best-in-class building technologies and energy storage. In their quest to continually improve operations, they implemented a modern data architecture based on Hadoop. They started with a small successful proof of concept and recognized the need to make more of their data accessible to more teams. Johnson Controls was able to successfully integrate Big Data technology into more of their operations that ultimately supports their goals to create better products, reduce waste, and increase profitability.
Join this webinar where our guest speaker from Johnson Controls shares their journey from a small Hadoop POC to a global production-ready implementation that includes security and governance.
You will hear:
•What steps JCI took throughout the process
•What framework and technologies they used
•How they engaged executives for full corporate buy-in
•Issues they encountered and solved
•How JCI was able to provide a secure reliable platform to consolidate global data
•Their next steps to complete the global integration.
Speakers: Tim Derrico, Manager of Architecture and Strategy - Big Data, Johnson Controls
Thomas Clarke, Managing Principal, RCG Global Services
Eric Thorsen, VP Retail / Industry Solutions, Hortonworks
Co-hosted by Hortonworks and RCG Global Services
As universities continue to adopt technology in the classroom and around the campus, they face increasing network security risks, including persistent cyberattacks and the potential theft or manipulation of student data.
This webinar will address these challenges and discuss how universities can effectively manage the rapid expansion of the number of devices students, visitors, tutors, and administrators are adding to their IT networks. Hear about how universities have regained control of their networks and find out how your institution can do the same.
David Cuthbertson will show you methods and techniques to help achieve a baseline map of your IT systems, supporting not just GDPR issues but also change control, operational management and risk assessment.Read more >
Welcome to Pulse Secure’s webinar series on The Six W’s of Pulse Secure! We will take you through the journey on the perfect formula for staying contemporary in the vast evolving world of Hybrid IT.
The forth webinar in our series will guide you through all the variables and complexities that are associated with Network Access Control, and why Policy Secure is your comprehensive and easy solution for BYOD onboarding, granular security, easy deployment, and open integration.
During this webinar, we will continue our conversation on the 2013 COSO Framework. The focus will specifically be on the implications to IT controls.Read more >
Legislation is being implemented around the world to reduce emissions of pollutants from coal-fired power plants. For those countries that started to apply control strategies several years ago, the control technology market has evolved alongside the legislation in a somewhat piecemeal manner. So the majority of older plants in developed regions have applied controls in series: control technologies for particulates first, followed by controls for SO2, and then controls for NOx. New legislation is introducing requirements for mercury and fine particulate control in some regions, often requiring further retrofitting of additional control systems. For those emerging regions that are just starting to bring in control requirements, there is the option of copying this piece-by-piece approach to control, or alternatively to apply newer technologies which can control several pollutants simultaneously. This multi-pollutant approach could be cost-effective in many regions. However, the applicability of different technologies varies. For example, regions with high ash and/or high sulphur coals may require different control strategies from those with intrinsically cleaner coals. Also, availability of water, land and funds will all play a role in determining which technology will be applied at each plant. And so the control technology market that is currently expanding in Asia may differ significantly from that in North America and the EU. The international marketing strategies for emission control technology manufacturers must take into account differences in performance standards, economic challenges, business traditions and many other factors. This webinar summarises the potential markets for emissions control noting the areas for potential growth, such as China, Poland, India and Indonesia. Each has its own regional issues.Read more >
**Due to a Brighttalk/Amazon Technical Issue, this webinar was recorded on webex for those that couldn't make the session on 2/28 you can view on-demand**
In the past year, Symantec Control Compliance Suite (CCS) has added several new features that provide additional flexibility and platform coverage including:
• IT Compliance and security assessments for custom applications and services
• Security assessments across devices, servers and endpoints
• Security baselines for newer technologies like Docker
Please join us for this special webcast to learn how:
The new features will simplify and enhance your ability to assess the compliance of your data center and get an update on the product roadmap
En la actualidad las empresas experimentan brechas de seguridad que se presentan cada vez más por la falta de control de sus usuarios internos. La incapacidad de prevenir las violaciones puede generar pérdida de datos, daños en la reputación, interrupciones en las operaciones y otras repercusiones costosas.
Lo invitamos a un webinar donde podrá conocer cómo la administración y control de los usuarios privilegiados es fundamental para reducir el riesgo y abordar los requisitos de cumplimiento.
ICSs (Industrial Control Systems) make up part of the “Internet of Things” and are used throughout the industrial infrastructures of electric power, water, pipelines, manufacturing, and transportation. ICSs are technically and operationally different than business IT systems. The policies, technologies, testing, and forensics used to secure IT may not be applicable to ICSs. For IT, Cyber security generally means malicious attacks using the Internet and targeting Windows systems. The same is not true for ICSs. There have already been more than 700 actual ICS cyber incidents causing impacts from trivial to significant environmental releases to equipment damage to deaths. However, very few of these incident have been identified as being cyber-related. This webinar will address what is ICS cyber security, why is ICS cyber security different than IT, what has actually been happening with ICS cyber security, and what should be done to help secure these critical systems.Read more >
Enterprise development teams are frequently working with multiple types of SCM repositories, such as Git and Subversion. Git does a solid job handling source code; Subversion does a solid job handling binary artifacts and is likely where many older projects' full histories reside. Managing both Subversion and Git repositories together is quite a challenge. Join us to learn how to make it easy.Read more >
Professor Bill Black, an expert on white-collar crime, former federal bank regulator, advisor to governments worldwide, and frequent commentator on fraud in America's financial markets, is the featured speaker in the inaugural installment of BLB&G’s Real-Time Speaker Series.
Dr. Black has spent decades exposing the destructive forces of corporate misconduct and regulatory languor. The discussion will focus on his work and current topics in corporate governance, including “control fraud” (frauds led by those that control a seemingly legitimate entity and use it as a "weapon" to defraud), the rise of the “Imperial CEO" in America, and what investors can do to reign in managerial excesses.
(NOTE: If you wish to ask a question, please click on the “Ask a Question” button at the top of the webcast screen and submit. Click on the adjacent "Attachments” button to view articles, video and other related materials pertaining to Dr. Black’s work. Please also feel free to rate the webcast by clicking on the “rate this” button.)
BLB&G’s Real-Time Speaker Series hosts candid conversations with academics, policy makers, and other experts about the financial markets and issues of importance to the institutional investor community.
The electric motors market is driven by an increase in the electrification of different applications across industries and the need to enhance energy efficiency of existing applications.
Demand for motors from heavy process industries is expected to stabilize in 2017 due to an increase in commodity prices. Food and beverage, water and wastewater, and discrete industries are expected to continue to strengthen in 2017. An increase in the electrification of automobiles (applications such as vehicle traction and other controls), growing adoption of higher-efficiency motors such as brushless DC motors, and Mega Trends such as innovating to zero and green energy are expected to influence customer preference in the electric motor market.
In this second session of a series of three webinars on risk management for accounting practices, we’ll discuss:
•Engagement risk assessment: The process of building a good client base from a risk management perspective
•The importance and components of effective engagement letters
•The importance of management letters and comments about internal controls
•Your areas of exposure to your clients and what to do if a client brings a claim
•The prevalence of claims for failure to detect employee embezzlement
By participating in this session you’ll gain an understanding of:
•How to build and manage a good client base
•What to include in your engagement letters and management letters to protect your firm
•What your lawyer will need to build an effective defense to a future client claim
This series of three webinars will qualify as 4 hours of CPE for CPAs:
•Each session will include 3 polling questions which makes the CPE credits NASBA eligible when taken live.
•Firms may register as one participant and share the experience in a conference room. Please provide a list of participants and participation dates on firm letterhead to receive CPE.
•Firms that have the ability to handle their own CPE’s will get a certificate of attendance.
Firms may qualify for premium credits:
•Firms that complete all 3 sessions either live or recorded are eligible for premium LC Credit with CPA ProSecure. CPA ProSecure Premium credits apply only when all three sessions have been viewed.
•Firms that are issued NAPLIA certificates do not need to submit additional information to NAPLIA for premium Credit.
•Non CPA ProSecure clients are welcome to attend for CPE’s but premium credits are not cannot guaranteed
Veel organisaties lopen tegen een aantal uitdagingen aan als het gaat om softwarelicenties en de vaak hoge kosten ervan;
- Software fabrikanten gebruiken veelal verschillende licentiemodellen
- Gebruikers installeren software terwijl IT er niets van weet
- Aangeschafte licenties blijven op de plank liggen
- Bij een vendor-audit kunnen er compliance issues naar boven komen die een boete tot gevolg hebben
Door gebruik te maken van Application Control kunnen organisaties veel geld op softwarelicenties besparen. Tijdens dit webinar vertellen Jorrit van Eijk en Gerko van Veen u wat Application Control is en laten ze door middel van een demo zien hoe het werkt.
Access security was simpler just a few years ago, right? Today, it can feel like chaos: The applications you protect are more complicated, your customers and employees are more demanding, and the threats you face are far more sophisticated.
Join us for an entire webinar dedicated to more secure, scalable access security. You’ll learn:
• A simpler, more flexible way to handle access security that protects all of your access points and improves the customer experience
• How some of the most complex, regulated organizations in the world use NetIQ solutions — and how they benefit
• How to solve the B2C access challenge, giving consumers access at massive scale without compromising security
Coal power plant control systems have progressively evolved to meet the growing demand for efficient and flexible power generation whilst maintaining low emissions. In particular, optimisation of the combustion process has required increased use of online monitoring technologies and the replacement of standard control loops with more advanced algorithms
capable of handling multivariable systems. Improved stoichiometric control can be achieved with
coal and air flow sensors or imaging and spectral analysis of the flame itself, whilst in-situ laser absorption spectroscopy provides a means of mapping CO and O2 distribution in hot regions of the furnace. Modern plant control systems are able to draw on a range of computational
techniques to determine the appropriate control response, including artificial intelligence which
mimics the actions of expert operators and complex empirical models built from operational data.
New sensor technologies are also being researched to further improve control and to withstand the high temperature and corrosive environments of advanced coal plant and gasifiers. Increased use of optical technologies is of particular interest, with sensors based on optical fibres able to perform low noise, highly sensitive, and distributed measurements at high temperatures.
Microelectronic fabrication techniques and newly developed high temperature materials are also being combined to develop miniaturised devices which provide a robust and low cost solution for in-situ monitoring of gases and other parameters. These new sensors can be integrated with wireless communication technology and self-powering systems to facilitate the deployment of distributed sensor networks and monitoring of inaccessible locations. Using principles of self-organisation to optimise their output, such networks may play a growing role in future control systems.
As the volume and diversity of mobile devices on your network continue to rise, so does the need to ensure that every device is safe. Cybercriminals leverage vulnerable endpoints as backdoors to the network and according to Gartner "by 2017, the focus of mobile breaches will shift to tablets and smartphones from workstations."
As the attack surface of your network continues to multiply with each new device, network access control is essential to securing your assets and critical infrastructure.
Attend this webinar to get a complete understanding of NAC functionality and how you can leverage visibility, policies, and automation to secure the critical edge of your network, including:
- Safe Onboarding – Allow users to self-register their devices securely, to reduce the burden on IT Staff
- Device Profiling – Identifies and classifies every device on the network to provide greater visibility
- Endpoint Compliance – Ensure every device is safe enough to join the network, to reduce risk
- Network Automation – Dynamically provision network access based on policies that leverage user, device, and location
- Security Automation – Capture and automatically execute complex investigative workflows that are time consuming and error prone
- Rapid Threat Response – Dramatically reduce the time required to contain compromised or infected devices
Dr. Guido Vranken and Lobke Tremmerie discuss how to implement Bulls XB algorithm, which uses RBC indices to create a weighted moving average of patient sample results, to statistically monitor hematology results. This unique algorithm, offered on Beckman Coulter hematology instruments, allows users to monitor result quality without additional reagents, software licenses or costs. Laboratories worldwide can implement this simple, powerful tool to enhance results and improve compliance.
P.A.C.E. credit is available for your participation.*
Presenters: Guido Vranken, Ph.D, has been working with customers for over 30 years across different disciplines, including protein chemistry, immunoassay and hematology. He specializes in conducting internal and external validation studies. Dr. Vranken spent three years as a lecturer on statistics at the University of Ghent. Lobke Tremmerie earned her environmental engineering degree from the University of Ghent in 2002. She first became an electrophoresis and nephelometry sales engineer at Analis, Beckman Coulter’s exclusive Belgian distributor. Following her true passion, she transferred into the hematology division in 2004. Ms. Tremmerie currently serves as Analis’ cellular biology product marketing manager.
Source code management systems contain the crown jewels of a software company's intellectual property. Effective auditing gives you a picture of who's accessing that IP and when changes are being made. This information can satisfy compliance and security requirements and give you new insights into your development practices. In this webinar we'll explore standard and extended audit reports available for Subversion and Git administrators.Read more >
In an age of connectivity, the ever-expanding Internet of Things has evolved to encompass control systems that govern physical processes such as food production, chemical production, energy production, defense systems, and safety systems. As with other IoT devices, remote connectivity enhances the functionality and efficiency of control systems, paving the way for new opportunities. However, the vast majority of control systems in use today were not designed with connectivity in mind and are vulnerable to malicious cyber attacks. As many of these systems are critical in nature, introducing them into a networked environment presents as many security challenges as it does advantages. Join Codenomicon and our esteemed guests for an engaging discussion about the business opportunities, challenges, and shifting approach to risk management posed by control systems in the Internet of Things.Read more >
The US Department of Homeland Security has defined 16 critical infrastructure sectors, including: chemical, communications, critical manufacturing, dams, defense, energy, financial, food and agriculture, healthcare, IT, nuclear, transportation and water and waste management.
Securing the industrial control systems (ICS) and SCADA networks requires a different approach that goes beyond threat detection, perimeter-based security, firewalls and physical security protections.
In this webinar, you’ll learn about how to architect and embed strong cybersecurity controls such as: secure boot, multi-factor authentication, secure software updates, secure communications between industrial devices (PLCs, sensors, IEDs, RTUs and controllers), gateways and industrial clouds. You’ll also learn about how to enable applications to call cryptographic functions that leverage hardware secure elements such as TPM, SGX, TrustZone as well as HSMs and SIMs.