Hi [[ session.user.profile.firstName ]]
Sort by:
    • Cyber Security of ICSs: What Is It and What Is Actually Happening Cyber Security of ICSs: What Is It and What Is Actually Happening Joe Weiss, CISM, CRISC, ISA Fellow, IEEE Senior Member, Applied Control Solutions, LLC Recorded: Oct 22 2015 4:00 pm UTC 48 mins
    • ICSs (Industrial Control Systems) make up part of the “Internet of Things” and are used throughout the industrial infrastructures of electric power, water, pipelines, manufacturing, and transportation. ICSs are technically and operationally different than business IT systems. The policies, technologies, testing, and forensics used to secure IT may not be applicable to ICSs. For IT, Cyber security generally means malicious attacks using the Internet and targeting Windows systems. The same is not true for ICSs. There have already been more than 700 actual ICS cyber incidents causing impacts from trivial to significant environmental releases to equipment damage to deaths. However, very few of these incident have been identified as being cyber-related. This webinar will address what is ICS cyber security, why is ICS cyber security different than IT, what has actually been happening with ICS cyber security, and what should be done to help secure these critical systems.

      Read more >
    • Control Fraud and The Imperial CEO: A Conversation with Professor Bill Black Control Fraud and The Imperial CEO: A Conversation with Professor Bill Black Professor William K. Black; Blair Nicholas; Brandon Marsh Recorded: Feb 11 2016 7:00 pm UTC 40 mins
    • Professor Bill Black, an expert on white-collar crime, former federal bank regulator, advisor to governments worldwide, and frequent commentator on fraud in America's financial markets, is the featured speaker in the inaugural installment of BLB&G’s Real-Time Speaker Series.

      Dr. Black has spent decades exposing the destructive forces of corporate misconduct and regulatory languor. The discussion will focus on his work and current topics in corporate governance, including “control fraud” (frauds led by those that control a seemingly legitimate entity and use it as a "weapon" to defraud), the rise of the “Imperial CEO" in America, and what investors can do to reign in managerial excesses.

      (NOTE: If you wish to ask a question, please click on the “Ask a Question” button at the top of the webcast screen and submit. Click on the adjacent "Attachments” button to view articles, video and other related materials pertaining to Dr. Black’s work. Please also feel free to rate the webcast by clicking on the “rate this” button.)

      ***
      BLB&G’s Real-Time Speaker Series hosts candid conversations with academics, policy makers, and other experts about the financial markets and issues of importance to the institutional investor community.

      Read more >
    • Loss Control Session Two:  Your Lines of Defense – Claims from Clients Loss Control Session Two: Your Lines of Defense – Claims from Clients Ralph Picardi, Esq. Recorded: Dec 17 2015 6:00 pm UTC 72 mins
    • In this second session of a series of three webinars on risk management for accounting practices, we’ll discuss:
      •Engagement risk assessment: The process of building a good client base from a risk management perspective
      •The importance and components of effective engagement letters
      •The importance of management letters and comments about internal controls
      •Your areas of exposure to your clients and what to do if a client brings a claim
      •The prevalence of claims for failure to detect employee embezzlement

      By participating in this session you’ll gain an understanding of:
      •How to build and manage a good client base
      •What to include in your engagement letters and management letters to protect your firm
      •What your lawyer will need to build an effective defense to a future client claim

      This series of three webinars will qualify as 4 hours of CPE for CPAs:

      •Each session will include 3 polling questions which makes the CPE credits NASBA eligible when taken live.
      •Firms may register as one participant and share the experience in a conference room. Please provide a list of participants and participation dates on firm letterhead to receive CPE.
      •Firms that have the ability to handle their own CPE’s will get a certificate of attendance.

      Firms may qualify for premium credits:
      •Firms that complete all 3 sessions either live or recorded are eligible for premium LC Credit with CPA ProSecure. CPA ProSecure Premium credits apply only when all three sessions have been viewed.
      •Firms that are issued NAPLIA certificates do not need to submit additional information to NAPLIA for premium Credit.
      •Non CPA ProSecure clients are welcome to attend for CPE’s but premium credits are not cannot guaranteed

      Read more >
    • Verlaag de kosten van softwarelicenties met Application Control Verlaag de kosten van softwarelicenties met Application Control Jorrit van Eijk en Gerko van Veen Recorded: Sep 18 2015 8:00 am UTC 46 mins
    • Veel organisaties lopen tegen een aantal uitdagingen aan als het gaat om softwarelicenties en de vaak hoge kosten ervan;

      - Software fabrikanten gebruiken veelal verschillende licentiemodellen
      - Gebruikers installeren software terwijl IT er niets van weet
      - Aangeschafte licenties blijven op de plank liggen
      - Bij een vendor-audit kunnen er compliance issues naar boven komen die een boete tot gevolg hebben

      Door gebruik te maken van Application Control kunnen organisaties veel geld op softwarelicenties besparen. Tijdens dit webinar vertellen Jorrit van Eijk en Gerko van Veen u wat Application Control is en laten ze door middel van een demo zien hoe het werkt.

      Read more >
    • Advanced sensors and smart control systems for coal-fired power plants Advanced sensors and smart control systems for coal-fired power plants Toby Lockwood Recorded: May 13 2015 11:00 am UTC 26 mins
    • Coal power plant control systems have progressively evolved to meet the growing demand for efficient and flexible power generation whilst maintaining low emissions. In particular, optimisation of the combustion process has required increased use of online monitoring technologies and the replacement of standard control loops with more advanced algorithms
      capable of handling multivariable systems. Improved stoichiometric control can be achieved with
      coal and air flow sensors or imaging and spectral analysis of the flame itself, whilst in-situ laser absorption spectroscopy provides a means of mapping CO and O2 distribution in hot regions of the furnace. Modern plant control systems are able to draw on a range of computational
      techniques to determine the appropriate control response, including artificial intelligence which
      mimics the actions of expert operators and complex empirical models built from operational data.
      New sensor technologies are also being researched to further improve control and to withstand the high temperature and corrosive environments of advanced coal plant and gasifiers. Increased use of optical technologies is of particular interest, with sensors based on optical fibres able to perform low noise, highly sensitive, and distributed measurements at high temperatures.
      Microelectronic fabrication techniques and newly developed high temperature materials are also being combined to develop miniaturised devices which provide a robust and low cost solution for in-situ monitoring of gases and other parameters. These new sensors can be integrated with wireless communication technology and self-powering systems to facilitate the deployment of distributed sensor networks and monitoring of inaccessible locations. Using principles of self-organisation to optimise their output, such networks may play a growing role in future control systems.

      Read more >
    • Visibility and Control for your Healthcare organisation Visibility and Control for your Healthcare organisation Security Architect, Healthcare Recorded: May 19 2016 2:00 am UTC 42 mins
    • IT security and network teams at healthcare providers around the world must ensure the utmost patient care and rapidly adopt new technology all while enabling safe access to patient data from hospitals, remote clinics, physician’s offices, business affiliates and a myriad of devices.

      They must also ensure compliance with increasingly stringent regulations that impact patient data and medical equipment – and systematically detect and block a rising volume of threats.

      In this webinar you will learn how our platform approach enables healthcare organizations to:
      • Provide patient care while protecting their data from compromise
      • Rationalize the scope of compliance
      • Improve uptime and availability
      • Meet new and emerging technological challenges while reducing security threats by providing visibility, automation and integration to your enterprise

      Read more >
    • Visibility and Control for your Healthcare organisation Visibility and Control for your Healthcare organisation Security Architect, Healthcare Recorded: May 19 2016 9:00 am UTC 43 mins
    • IT security and network teams at healthcare providers around the world must ensure the utmost patient care and rapidly adopt new technology all while enabling safe access to patient data from hospitals, remote clinics, physician’s offices, business affiliates and a myriad of devices.

      They must also ensure compliance with increasingly stringent regulations that impact patient data and medical equipment – and systematically detect and block a rising volume of threats.

      In this webinar you will learn how our platform approach enables healthcare organizations to:
      • Provide patient care while protecting their data from compromise
      • Rationalize the scope of compliance
      • Improve uptime and availability
      • Meet new and emerging technological challenges while reducing security threats by providing visibility, automation and integration to your enterprise

      Read more >
    • Network Access Control 101: Secure the Critical Edge of Your Network Network Access Control 101: Secure the Critical Edge of Your Network Tom Murphy, CMO, Bradford Networks Recorded: Jun 2 2015 5:00 pm UTC 41 mins
    • As the volume and diversity of mobile devices on your network continue to rise, so does the need to ensure that every device is safe. Cybercriminals leverage vulnerable endpoints as backdoors to the network and according to Gartner "by 2017, the focus of mobile breaches will shift to tablets and smartphones from workstations."

      As the attack surface of your network continues to multiply with each new device, network access control is essential to securing your assets and critical infrastructure.

      Attend this webinar to get a complete understanding of NAC functionality and how you can leverage visibility, policies, and automation to secure the critical edge of your network, including:

      - Safe Onboarding – Allow users to self-register their devices securely, to reduce the burden on IT Staff
      - Device Profiling – Identifies and classifies every device on the network to provide greater visibility
      - Endpoint Compliance – Ensure every device is safe enough to join the network, to reduce risk
      - Network Automation – Dynamically provision network access based on policies that leverage user, device, and location
      - Security Automation – Capture and automatically execute complex investigative workflows that are time consuming and error prone
      - Rapid Threat Response – Dramatically reduce the time required to contain compromised or infected devices

      Read more >
    • Network Security and Application Control with Dell Next Generation Firewalls Network Security and Application Control with Dell Next Generation Firewalls Sathya Thammanur Product Manager at Dell SonicWALL Recorded: Mar 28 2014 4:00 pm UTC 49 mins
    • Traditional firewalls have always focused on offering port specific protection (i.e., stateful firewalling). Current day threats are web-based, and often are malicious applications that pass through traditional ports.

      Discover how you can overcome the limitations of traditional stateful firewalls with the comprehensive deep security of Dell SonicWALL next-generation firewalls. See why it is essential for your network protection and increased productivity to have application intelligence and control—one of the key features of our next-generation firewalls.

      This webcast will show you how to:
      •Gain true network protection with deep network security
      •Effectively manage network bandwidth using application intelligence and control
      •Provide granular application control: e.g., allow Facebook, but block Facebook Apps

      Read more >
    • Network Access Control 101: Securing the Critical Edge of Your Network Network Access Control 101: Securing the Critical Edge of Your Network Tom Murphy, CMO, Bradford Networks Recorded: Oct 7 2014 3:00 pm UTC 31 mins
    • As the volume and diversity of mobile devices on your network continue to rise, so does the need to ensure that every device is safe. Cybercriminals leverage vulnerable endpoints as backdoors to the network and according to Gartner "by 2017, the focus of mobile breaches will shift to tablets and smartphones from workstations."

      As the attack surface of your network continues to multiply with each new device, network access control is essential to securing your assets and critical infrastructure.

      Attend this webinar to get a complete understanding of NAC functionality and how you can leverage visibility, policies, and automation to secure the critical edge of your network, including:

      - Safe Onboarding – Allow users to self-register their devices securely, to reduce the burden on IT Staff
      - Device Profiling – Identifies and classifies every device on the network to provide greater visibility
      - Endpoint Compliance – Ensure every device is safe enough to join the network, to reduce risk
      - Network Automation – Dynamically provision network access based on policies that leverage user, device, and location
      - Security Automation – Capture and automatically execute complex investigative workflows that are time consuming and error prone
      - Rapid Threat Response – Dramatically reduce the time required to contain compromised or infected devices

      Read more >
    • Triaging the Cloud: 5 Steps to Putting the Cloud Controls Matrix to Work.... Triaging the Cloud: 5 Steps to Putting the Cloud Controls Matrix to Work.... John Howie, Cloud Security Alliance; Doug Meier, Pandora; Krishna Narayanaswamy, Netskope Recorded: Jul 24 2014 6:00 pm UTC 61 mins
    • The Cloud Security Alliance’s Cloud Controls Matrix is a rich source of cloud security best practices designed as a framework to provide fundamental security principles to cloud vendors and cloud customers. It serves as a useful guidepost for app developers and technology decision-makers alike. But what if you really want to put it to work across all of the cloud services your organization is using, whether sanctioned or “shadow IT?” And how do you triage those services once you know what they are and how enterprise-ready they are?

      Join Cloud Security Alliance Chief Operating Officer, John Howie, Pandora Director of Information Security, Doug Meier, and Netskope Chief Scientist, Krishna Narayanaswamy, for a practical discussion and set of next steps to making the CCM work for you and triaging the apps you discover. Attendees will:

      • Learn guidelines for when and how to use the CCM
      • Hear how security experts are bringing the CCM to life in their organizations
      • Gain practical advice for how to triage your cloud services once you know what they are and how enterprise-ready they are
      • Discover ways to exert CCM controls even in cases of “shadow IT”

      Read more >