During this webinar, we will continue our conversation on the 2013 COSO Framework. The focus will specifically be on the implications to IT controls.Read more >
Join Cloud expert Jerry Wertelecky as he discusses shadow IT and its implications to your cost and control environment.Read more >
ICSs (Industrial Control Systems) make up part of the “Internet of Things” and are used throughout the industrial infrastructures of electric power, water, pipelines, manufacturing, and transportation. ICSs are technically and operationally different than business IT systems. The policies, technologies, testing, and forensics used to secure IT may not be applicable to ICSs. For IT, Cyber security generally means malicious attacks using the Internet and targeting Windows systems. The same is not true for ICSs. There have already been more than 700 actual ICS cyber incidents causing impacts from trivial to significant environmental releases to equipment damage to deaths. However, very few of these incident have been identified as being cyber-related. This webinar will address what is ICS cyber security, why is ICS cyber security different than IT, what has actually been happening with ICS cyber security, and what should be done to help secure these critical systems.Read more >
Professor Bill Black, an expert on white-collar crime, former federal bank regulator, advisor to governments worldwide, and frequent commentator on fraud in America's financial markets, is the featured speaker in the inaugural installment of BLB&G’s Real-Time Speaker Series.
Dr. Black has spent decades exposing the destructive forces of corporate misconduct and regulatory languor. The discussion will focus on his work and current topics in corporate governance, including “control fraud” (frauds led by those that control a seemingly legitimate entity and use it as a "weapon" to defraud), the rise of the “Imperial CEO" in America, and what investors can do to reign in managerial excesses.
Presenters: Professor William K. Black, Associate Professor of Economics and Law, University of Missouri, Kansas City; Blair Nicholas, Partner, Bernstein Litowitz Berger & Grossmann LLP; Brandon Marsh, Associate, Bernstein Litowitz Berger & Grossmann LLP
BLB&G’s Real-Time Speaker Series hosts candid conversations with academics, policy makers, commentators and other experts about the financial markets and issues of importance to the institutional investor community.
In this second session of a series of three webinars on risk management for accounting practices, we’ll discuss:
•Engagement risk assessment: The process of building a good client base from a risk management perspective
•The importance and components of effective engagement letters
•The importance of management letters and comments about internal controls
•Your areas of exposure to your clients and what to do if a client brings a claim
•The prevalence of claims for failure to detect employee embezzlement
By participating in this session you’ll gain an understanding of:
•How to build and manage a good client base
•What to include in your engagement letters and management letters to protect your firm
•What your lawyer will need to build an effective defense to a future client claim
This series of three webinars will qualify as 4 hours of CPE for CPAs:
•Each session will include 3 polling questions which makes the CPE credits NASBA eligible when taken live.
•Firms may register as one participant and share the experience in a conference room. Please provide a list of participants and participation dates on firm letterhead to receive CPE.
•Firms that have the ability to handle their own CPE’s will get a certificate of attendance.
Firms may qualify for premium credits:
•Firms that complete all 3 sessions either live or recorded are eligible for premium LC Credit with CPA ProSecure. CPA ProSecure Premium credits apply only when all three sessions have been viewed.
•Firms that are issued NAPLIA certificates do not need to submit additional information to NAPLIA for premium Credit.
•Non CPA ProSecure clients are welcome to attend for CPE’s but premium credits are not cannot guaranteed
Veel organisaties lopen tegen een aantal uitdagingen aan als het gaat om softwarelicenties en de vaak hoge kosten ervan;
- Software fabrikanten gebruiken veelal verschillende licentiemodellen
- Gebruikers installeren software terwijl IT er niets van weet
- Aangeschafte licenties blijven op de plank liggen
- Bij een vendor-audit kunnen er compliance issues naar boven komen die een boete tot gevolg hebben
Door gebruik te maken van Application Control kunnen organisaties veel geld op softwarelicenties besparen. Tijdens dit webinar vertellen Jorrit van Eijk en Gerko van Veen u wat Application Control is en laten ze door middel van een demo zien hoe het werkt.
Coal power plant control systems have progressively evolved to meet the growing demand for efficient and flexible power generation whilst maintaining low emissions. In particular, optimisation of the combustion process has required increased use of online monitoring technologies and the replacement of standard control loops with more advanced algorithms
capable of handling multivariable systems. Improved stoichiometric control can be achieved with
coal and air flow sensors or imaging and spectral analysis of the flame itself, whilst in-situ laser absorption spectroscopy provides a means of mapping CO and O2 distribution in hot regions of the furnace. Modern plant control systems are able to draw on a range of computational
techniques to determine the appropriate control response, including artificial intelligence which
mimics the actions of expert operators and complex empirical models built from operational data.
New sensor technologies are also being researched to further improve control and to withstand the high temperature and corrosive environments of advanced coal plant and gasifiers. Increased use of optical technologies is of particular interest, with sensors based on optical fibres able to perform low noise, highly sensitive, and distributed measurements at high temperatures.
Microelectronic fabrication techniques and newly developed high temperature materials are also being combined to develop miniaturised devices which provide a robust and low cost solution for in-situ monitoring of gases and other parameters. These new sensors can be integrated with wireless communication technology and self-powering systems to facilitate the deployment of distributed sensor networks and monitoring of inaccessible locations. Using principles of self-organisation to optimise their output, such networks may play a growing role in future control systems.
As the volume and diversity of mobile devices on your network continue to rise, so does the need to ensure that every device is safe. Cybercriminals leverage vulnerable endpoints as backdoors to the network and according to Gartner "by 2017, the focus of mobile breaches will shift to tablets and smartphones from workstations."
As the attack surface of your network continues to multiply with each new device, network access control is essential to securing your assets and critical infrastructure.
Attend this webinar to get a complete understanding of NAC functionality and how you can leverage visibility, policies, and automation to secure the critical edge of your network, including:
- Safe Onboarding – Allow users to self-register their devices securely, to reduce the burden on IT Staff
- Device Profiling – Identifies and classifies every device on the network to provide greater visibility
- Endpoint Compliance – Ensure every device is safe enough to join the network, to reduce risk
- Network Automation – Dynamically provision network access based on policies that leverage user, device, and location
- Security Automation – Capture and automatically execute complex investigative workflows that are time consuming and error prone
- Rapid Threat Response – Dramatically reduce the time required to contain compromised or infected devices
In an age of connectivity, the ever-expanding Internet of Things has evolved to encompass control systems that govern physical processes such as food production, chemical production, energy production, defense systems, and safety systems. As with other IoT devices, remote connectivity enhances the functionality and efficiency of control systems, paving the way for new opportunities. However, the vast majority of control systems in use today were not designed with connectivity in mind and are vulnerable to malicious cyber attacks. As many of these systems are critical in nature, introducing them into a networked environment presents as many security challenges as it does advantages. Join Codenomicon and our esteemed guests for an engaging discussion about the business opportunities, challenges, and shifting approach to risk management posed by control systems in the Internet of Things.Read more >
Forget the geeky analysis of cloud security; risk is driven by people involved and the approach to adoption. This discussion will tackle the complex issues around data ownership and control in the hands of customers, providers, law enforcement, intelligence agencies and a pantheon of adversaries.
If data is destiny, then too many people are in charge of your fate.
We discuss how to get it back.
Traditional firewalls have always focused on offering port specific protection (i.e., stateful firewalling). Current day threats are web-based, and often are malicious applications that pass through traditional ports.
Discover how you can overcome the limitations of traditional stateful firewalls with the comprehensive deep security of Dell SonicWALL next-generation firewalls. See why it is essential for your network protection and increased productivity to have application intelligence and control—one of the key features of our next-generation firewalls.
This webcast will show you how to:
•Gain true network protection with deep network security
•Effectively manage network bandwidth using application intelligence and control
•Provide granular application control: e.g., allow Facebook, but block Facebook Apps
With multiple mandates, constantly changing IT environments and a vast and evolving threat landscape—maintaining compliance requires measurable and enforceable controls. Now you can reduce risk and continuously comply with internal policies and external regulations.
Join us for this webcast to learn how a comprehensive and automated controls assessment can help you quickly and easily demonstrate due diligence about securing your IT assets through:
• System-hardening controls—selecting host and app settings to check for each policy
• Deep assessment—automatically scanning and analyzing your entire network