Hi [[ session.user.profile.firstName ]]
Sort by:
    • How Johnson Controls Moved From Proof of Concept to a Global Big Data Solution
      How Johnson Controls Moved From Proof of Concept to a Global Big Data Solution Johnson Controls, Hortonworks and RCG Recorded: Nov 9 2016 6:00 pm UTC 56 mins
    • Johnson Controls delivers best-in-class building technologies and energy storage. In their quest to continually improve operations, they implemented a modern data architecture based on Hadoop. They started with a small successful proof of concept and recognized the need to make more of their data accessible to more teams. Johnson Controls was able to successfully integrate Big Data technology into more of their operations that ultimately supports their goals to create better products, reduce waste, and increase profitability.

      Join this webinar where our guest speaker from Johnson Controls shares their journey from a small Hadoop POC to a global production-ready implementation that includes security and governance.

      You will hear:
      •What steps JCI took throughout the process
      •What framework and technologies they used
      •How they engaged executives for full corporate buy-in
      •Issues they encountered and solved
      •How JCI was able to provide a secure reliable platform to consolidate global data
      •Their next steps to complete the global integration.

      Speakers: Tim Derrico, Manager of Architecture and Strategy - Big Data, Johnson Controls
      Thomas Clarke, Managing Principal, RCG Global Services
      Eric Thorsen, VP Retail / Industry Solutions, Hortonworks

      Co-hosted by Hortonworks and RCG Global Services

      Read more >
    • Emerging markets for pollution control technologies
      Emerging markets for pollution control technologies Dr Lesley Sloss Recorded: Jan 18 2017 12:00 pm UTC 45 mins
    • Legislation is being implemented around the world to reduce emissions of pollutants from coal-fired power plants. For those countries that started to apply control strategies several years ago, the control technology market has evolved alongside the legislation in a somewhat piecemeal manner. So the majority of older plants in developed regions have applied controls in series: control technologies for particulates first, followed by controls for SO2, and then controls for NOx. New legislation is introducing requirements for mercury and fine particulate control in some regions, often requiring further retrofitting of additional control systems. For those emerging regions that are just starting to bring in control requirements, there is the option of copying this piece-by-piece approach to control, or alternatively to apply newer technologies which can control several pollutants simultaneously. This multi-pollutant approach could be cost-effective in many regions. However, the applicability of different technologies varies. For example, regions with high ash and/or high sulphur coals may require different control strategies from those with intrinsically cleaner coals. Also, availability of water, land and funds will all play a role in determining which technology will be applied at each plant. And so the control technology market that is currently expanding in Asia may differ significantly from that in North America and the EU. The international marketing strategies for emission control technology manufacturers must take into account differences in performance standards, economic challenges, business traditions and many other factors. This webinar summarises the potential markets for emissions control noting the areas for potential growth, such as China, Poland, India and Indonesia. Each has its own regional issues.

      Read more >
    • Doing More With Symantec Control Compliance Suite
      Doing More With Symantec Control Compliance Suite Anand Visvanathan, Principal Product Manager, Symantec Recorded: Feb 28 2017 6:00 pm UTC 39 mins
    • **Due to a Brighttalk/Amazon Technical Issue, this webinar was recorded on webex for those that couldn't make the session on 2/28 you can view on-demand**

      In the past year, Symantec Control Compliance Suite (CCS) has added several new features that provide additional flexibility and platform coverage including:

      • IT Compliance and security assessments for custom applications and services

      • Security assessments across devices, servers and endpoints

      • Security baselines for newer technologies like Docker

      Please join us for this special webcast to learn how:

      The new features will simplify and enhance your ability to assess the compliance of your data center and get an update on the product roadmap

      View Now

      Read more >
    • Cyber Security of ICSs: What Is It and What Is Actually Happening
      Cyber Security of ICSs: What Is It and What Is Actually Happening Joe Weiss, CISM, CRISC, ISA Fellow, IEEE Senior Member, Applied Control Solutions, LLC Recorded: Oct 22 2015 4:00 pm UTC 48 mins
    • ICSs (Industrial Control Systems) make up part of the “Internet of Things” and are used throughout the industrial infrastructures of electric power, water, pipelines, manufacturing, and transportation. ICSs are technically and operationally different than business IT systems. The policies, technologies, testing, and forensics used to secure IT may not be applicable to ICSs. For IT, Cyber security generally means malicious attacks using the Internet and targeting Windows systems. The same is not true for ICSs. There have already been more than 700 actual ICS cyber incidents causing impacts from trivial to significant environmental releases to equipment damage to deaths. However, very few of these incident have been identified as being cyber-related. This webinar will address what is ICS cyber security, why is ICS cyber security different than IT, what has actually been happening with ICS cyber security, and what should be done to help secure these critical systems.

      Read more >
    • Control Fraud and The Imperial CEO: A Conversation with Professor Bill Black
      Control Fraud and The Imperial CEO: A Conversation with Professor Bill Black Professor William K. Black; Blair Nicholas; Brandon Marsh Recorded: Feb 11 2016 7:00 pm UTC 40 mins
    • Professor Bill Black, an expert on white-collar crime, former federal bank regulator, advisor to governments worldwide, and frequent commentator on fraud in America's financial markets, is the featured speaker in the inaugural installment of BLB&G’s Real-Time Speaker Series.

      Dr. Black has spent decades exposing the destructive forces of corporate misconduct and regulatory languor. The discussion will focus on his work and current topics in corporate governance, including “control fraud” (frauds led by those that control a seemingly legitimate entity and use it as a "weapon" to defraud), the rise of the “Imperial CEO" in America, and what investors can do to reign in managerial excesses.

      (NOTE: If you wish to ask a question, please click on the “Ask a Question” button at the top of the webcast screen and submit. Click on the adjacent "Attachments” button to view articles, video and other related materials pertaining to Dr. Black’s work. Please also feel free to rate the webcast by clicking on the “rate this” button.)

      ***
      BLB&G’s Real-Time Speaker Series hosts candid conversations with academics, policy makers, and other experts about the financial markets and issues of importance to the institutional investor community.

      Read more >
    • Loss Control Session Two:  Your Lines of Defense – Claims from Clients
      Loss Control Session Two: Your Lines of Defense – Claims from Clients Ralph Picardi, Esq. Recorded: Dec 17 2015 6:00 pm UTC 72 mins
    • In this second session of a series of three webinars on risk management for accounting practices, we’ll discuss:
      •Engagement risk assessment: The process of building a good client base from a risk management perspective
      •The importance and components of effective engagement letters
      •The importance of management letters and comments about internal controls
      •Your areas of exposure to your clients and what to do if a client brings a claim
      •The prevalence of claims for failure to detect employee embezzlement

      By participating in this session you’ll gain an understanding of:
      •How to build and manage a good client base
      •What to include in your engagement letters and management letters to protect your firm
      •What your lawyer will need to build an effective defense to a future client claim

      This series of three webinars will qualify as 4 hours of CPE for CPAs:

      •Each session will include 3 polling questions which makes the CPE credits NASBA eligible when taken live.
      •Firms may register as one participant and share the experience in a conference room. Please provide a list of participants and participation dates on firm letterhead to receive CPE.
      •Firms that have the ability to handle their own CPE’s will get a certificate of attendance.

      Firms may qualify for premium credits:
      •Firms that complete all 3 sessions either live or recorded are eligible for premium LC Credit with CPA ProSecure. CPA ProSecure Premium credits apply only when all three sessions have been viewed.
      •Firms that are issued NAPLIA certificates do not need to submit additional information to NAPLIA for premium Credit.
      •Non CPA ProSecure clients are welcome to attend for CPE’s but premium credits are not cannot guaranteed

      Read more >
    • Verlaag de kosten van softwarelicenties met Application Control
      Verlaag de kosten van softwarelicenties met Application Control Jorrit van Eijk en Gerko van Veen Recorded: Sep 18 2015 8:00 am UTC 46 mins
    • Veel organisaties lopen tegen een aantal uitdagingen aan als het gaat om softwarelicenties en de vaak hoge kosten ervan;

      - Software fabrikanten gebruiken veelal verschillende licentiemodellen
      - Gebruikers installeren software terwijl IT er niets van weet
      - Aangeschafte licenties blijven op de plank liggen
      - Bij een vendor-audit kunnen er compliance issues naar boven komen die een boete tot gevolg hebben

      Door gebruik te maken van Application Control kunnen organisaties veel geld op softwarelicenties besparen. Tijdens dit webinar vertellen Jorrit van Eijk en Gerko van Veen u wat Application Control is en laten ze door middel van een demo zien hoe het werkt.

      Read more >
    • Taking the Chaos out of Access Control
      Taking the Chaos out of Access Control Kent Purdy (Micro Focus / NetIQ) & Jerry Combs (Idenhaus Consulting) Recorded: Feb 23 2017 4:00 pm UTC 55 mins
    • Access security was simpler just a few years ago, right? Today, it can feel like chaos: The applications you protect are more complicated, your customers and employees are more demanding, and the threats you face are far more sophisticated.

      Join us for an entire webinar dedicated to more secure, scalable access security. You’ll learn:

      • A simpler, more flexible way to handle access security that protects all of your access points and improves the customer experience

      • How some of the most complex, regulated organizations in the world use NetIQ solutions — and how they benefit

      • How to solve the B2C access challenge, giving consumers access at massive scale without compromising security

      Read more >
    • Advanced sensors and smart control systems for coal-fired power plants
      Advanced sensors and smart control systems for coal-fired power plants Toby Lockwood Recorded: May 13 2015 11:00 am UTC 26 mins
    • Coal power plant control systems have progressively evolved to meet the growing demand for efficient and flexible power generation whilst maintaining low emissions. In particular, optimisation of the combustion process has required increased use of online monitoring technologies and the replacement of standard control loops with more advanced algorithms
      capable of handling multivariable systems. Improved stoichiometric control can be achieved with
      coal and air flow sensors or imaging and spectral analysis of the flame itself, whilst in-situ laser absorption spectroscopy provides a means of mapping CO and O2 distribution in hot regions of the furnace. Modern plant control systems are able to draw on a range of computational
      techniques to determine the appropriate control response, including artificial intelligence which
      mimics the actions of expert operators and complex empirical models built from operational data.
      New sensor technologies are also being researched to further improve control and to withstand the high temperature and corrosive environments of advanced coal plant and gasifiers. Increased use of optical technologies is of particular interest, with sensors based on optical fibres able to perform low noise, highly sensitive, and distributed measurements at high temperatures.
      Microelectronic fabrication techniques and newly developed high temperature materials are also being combined to develop miniaturised devices which provide a robust and low cost solution for in-situ monitoring of gases and other parameters. These new sensors can be integrated with wireless communication technology and self-powering systems to facilitate the deployment of distributed sensor networks and monitoring of inaccessible locations. Using principles of self-organisation to optimise their output, such networks may play a growing role in future control systems.

      Read more >
    • Network Access Control 101: Secure the Critical Edge of Your Network
      Network Access Control 101: Secure the Critical Edge of Your Network Tom Murphy, CMO, Bradford Networks Recorded: Jun 2 2015 5:00 pm UTC 41 mins
    • As the volume and diversity of mobile devices on your network continue to rise, so does the need to ensure that every device is safe. Cybercriminals leverage vulnerable endpoints as backdoors to the network and according to Gartner "by 2017, the focus of mobile breaches will shift to tablets and smartphones from workstations."

      As the attack surface of your network continues to multiply with each new device, network access control is essential to securing your assets and critical infrastructure.

      Attend this webinar to get a complete understanding of NAC functionality and how you can leverage visibility, policies, and automation to secure the critical edge of your network, including:

      - Safe Onboarding – Allow users to self-register their devices securely, to reduce the burden on IT Staff
      - Device Profiling – Identifies and classifies every device on the network to provide greater visibility
      - Endpoint Compliance – Ensure every device is safe enough to join the network, to reduce risk
      - Network Automation – Dynamically provision network access based on policies that leverage user, device, and location
      - Security Automation – Capture and automatically execute complex investigative workflows that are time consuming and error prone
      - Rapid Threat Response – Dramatically reduce the time required to contain compromised or infected devices

      Read more >
    • Achieve Better Hematology Quality Control with Bulls X̄B
      Achieve Better Hematology Quality Control with Bulls X̄B Dr. Guido Vranken and Lobke Tremmerie Recorded: Dec 13 2016 4:00 pm UTC 50 mins
    • Dr. Guido Vranken and Lobke Tremmerie discuss how to implement Bulls XB algorithm, which uses RBC indices to create a weighted moving average of patient sample results, to statistically monitor hematology results. This unique algorithm, offered on Beckman Coulter hematology instruments, allows users to monitor result quality without additional reagents, software licenses or costs. Laboratories worldwide can implement this simple, powerful tool to enhance results and improve compliance.

      P.A.C.E. credit is available for your participation.*

      Presenters: Guido Vranken, Ph.D, has been working with customers for over 30 years across different disciplines, including protein chemistry, immunoassay and hematology. He specializes in conducting internal and external validation studies. Dr. Vranken spent three years as a lecturer on statistics at the University of Ghent. Lobke Tremmerie earned her environmental engineering degree from the University of Ghent in 2002. She first became an electrophoresis and nephelometry sales engineer at Analis, Beckman Coulter’s exclusive Belgian distributor. Following her true passion, she transferred into the hematology division in 2004. Ms. Tremmerie currently serves as Analis’ cellular biology product marketing manager.

      Read more >
    • Securing Critical Infrastructure with Advanced Cybersecurity Controls
      Securing Critical Infrastructure with Advanced Cybersecurity Controls Keao Caindec, VP of Marketing and Dean Weber, CTO, Mocana Recorded: Aug 1 2017 6:00 pm UTC 46 mins
    • The US Department of Homeland Security has defined 16 critical infrastructure sectors, including: chemical, communications, critical manufacturing, dams, defense, energy, financial, food and agriculture, healthcare, IT, nuclear, transportation and water and waste management.

      Securing the industrial control systems (ICS) and SCADA networks requires a different approach that goes beyond threat detection, perimeter-based security, firewalls and physical security protections.

      In this webinar, you’ll learn about how to architect and embed strong cybersecurity controls such as: secure boot, multi-factor authentication, secure software updates, secure communications between industrial devices (PLCs, sensors, IEDs, RTUs and controllers), gateways and industrial clouds. You’ll also learn about how to enable applications to call cryptographic functions that leverage hardware secure elements such as TPM, SGX, TrustZone as well as HSMs and SIMs.

      Read more >