Health and safety management has its share of chaos, and a hard hat won’t help. Workplace accidents can result in OSHA fines, or lawsuits can damage the company’s reputation. Even when all goes well, health and safety professionals are buried in compliance paperwork. In this one-hour webinar led by Lockpath’s Sam Abadir, you’ll discover:
• The current trends within health and safety risk management
• Common challenges organizations face with health and safety compliance
• Where your organization falls on the health and safety maturity model
You will also learn how integrating health and safety into a governance, risk management and compliance program can create a more efficient and effective health and safety program.
Contract lifecycle management (CLM) software helps firms optimize business transactions by linking five essential stages. However, fewer than one in five of all CLM customers captures all the strategic values a CLM implementation can bring.
We don’t want that to happen to you or your organization so we’ve put together a webinar that will highlight the best practices for professionals to follow when embarking on a CLM project.
Register to watch IACCM CEO Tim Cummins and Conga VP of Product Management for CLM Skip Walter chat about:
- Learn how to engage with stakeholders early and managing their expectations
-Have a solid and funded business case that drives later stages of implementation --- not leaving any money on the table
-Boost efficiency while overcoming bottlenecks and pitfalls
-Realize the importance of getting contract management right
Exciting enhancements to PCoIP Management Console are now available in Release 3.1. Learn more about the new capabilities and participate in our live Q&A with Teradici experts Paul Barrett, Systems Specialist, Global Support Services and Arjen van der Meulen, Director of Product Management. This brief webinar will cover everything you need to do about this important release through a live demonstration, including:
-The new licensing web interface
-How to discover and manage PCoIP Remote Workstation Cards
-How to peer a zero client with a PCoIP Remote Workstation Card
In this webinar, Lockpath's Sam Abadir answers 5 questions on the road to reaching an effective vendor risk management program:
• What encompasses Vendor Risk Management?
• Who needs to know about Vendor Risk Management?
• How does someone approach building a VRM program?
• What does that approach look like today?
• What will that approach look like in the future?
Artificial Intelligence has finally come to IT Service Management in the form of a Virtual Agent that can act as a Level-0 analyst. This webinar will explain how Luma, a virtual agent can perform the duties of a Level-0 technician, freeing organizations from the high cost of manning a help desk and providing round-the-clock support. You will see Luma in action, automating self-service, guiding users to create actionable tickets, performing knowledge lookups, and automating tasks such as reset password. Users stay informed of ticket status and can provide feedback whenever and wherever they are through the channel of your choice. Since a Level-0 tech should also unburden senior techs, you’ll see how Luma helps level-2 technicians improve their productivity by managing and assigning tickets, automatically following up with users, and enabling users to access and update ticket information without a human technician in the loop. Finally, see the no-coding tools available to create unique capabilities for your organization if the 200+ out of the box skills need to be extended.Read more >
Continual Service Improvements and minimizing the impact of Major Incident Management are critical to keeping your business running smoothly and out of the nightly news headlines.
This webinar, presented by ITSM process expert Ryan Schmierer and IT Service Management technology expert Mike Bombard will explore the role technology capabilities and process improvement can play to improve outcomes.
Ryan and Mike will discuss lessons learned from a major healthcare company case study and the challenges this company faced in managing major incidents. They will provide 5 things you can do today to improve major incident management and will discuss how by leveraging capabilities from discovery and infrastructure visualization tools will help your staff gain the insights they need to resolve issues quickly and continually make better-informed decisions.
Join us for a closer look at the recently launched ServiceNow Software Asset Management solution, which enables IT and finance leaders to take control of their software licenses by procuring, managing and optimizing the software needed to align to the business without surprises.
In this session, we’ll demonstrate how ServiceNow Software Asset Management allows enterprises to master the management of software licensing on one platform. Topics covered include:
•Introduction to Software Asset Management
•Benefits of ServiceNow’s single system of action
•Normalization process with the software library
•How to reconcile, reclaim and reassign licenses
Sales management expert Steven Rosen is hosting a fireside chat with fellow sales management expert Jason Jordan. Steven and Jason will have a no holds barred chat sharing their insights on the most challenging issues facing sales managers today.
No powperpoint, no videos, just open and frank discussion.
Expect an action-packed webinar filled with sales management gems, pearls, powerful insights and stories, that will help you crush your sales numbers.
The Office of the Comptroller of the Currency (OCC) recently released its operating plan priorities for 2018. A top priority is change management to address new regulation requirements. Whether you’re a banker or service provider to the financial industry, you may be aware of updated or new regulations like the National Flood Insurance Reform Act of 1994, the Military Lending Act, and the Prepaid Card Rule. In this webinar, you’ll learn what OCC’s Compliance and Community Affairs (CCA) Department intends to focus on and the role of technology in managing compliance and risk.
Attendees will learn:
• What to consider when designing, operating or improving their change management process
• The increased focus on fair lending from a quantity and quality perspective
• Policies, procedures, and processes for credit offered under the Military Lending Act
• What CCA examiners are looking for with banks relying on third-party relationships
• How GRC technology supports compliance and integrated risk management programs
Don’t miss this future focused webinar on an OCC priority for 2018. Make plans now to attend.
In this session Richard Josey will explore the key considerations when implementing or adapting a Change Management process. The following key questions will be addressed:
How do we make sure our change management process is appropriate?
How do we get the intended benefits from our Change Management Process?
How do we embed Change Management in our organization?
What else do we need to consider? How does Change relate to other processes, such as Configuration Management.
Making security policy changes manually is a slow, laborious process which is fraught with risks; it can take several days—sometimes weeks—to process a single change in a complex enterprise environment. When hundreds of changes are required each month, it can be an impossible task!
In this webinar, Yonatan Klein, Director of Product Management at AlgoSec, will discuss how automation can take your security policy management to the next level; delivering the most stringent security change management and control processes, while providing visibility and helping to maximize business agility across your disparate, ever-changing, hybrid cloud enterprise network.
Join the webinar to learn how you can use automation to:
• Discover and map application connectivity to centralize and optimize security policy management
• Migrate application connectivity across data centers, to the cloud, and throughout the DevOps lifecycle
• Ensure your disaster recovery processes for firewalls are secure and up-to-date
• Take an application-centric approach to simplifying firewall rule recertification processes
Attend this webinar to discover how you can reduce the time and effort you spend on managing security, while keeping your all your stakeholders happy – network and security operations teams, application owners, and even C-level executives.
Operational risk management (ORM) is a growing discipline within an organization’s integrated risk management programs. Its practices identify how the daily managed activities in businesses and external events impact strategic goals, value creation and operations. In this fast-paced webinar, Lockpath’s Sam Abadir will share how to get the most from your ORM programs. Specifically, you’ll learn how:
• Current trends and challenges in risk management are addressed with ORM processes
• Daily managed activities and external events impact overall business operations and strategic goals
• One organization is using a governance, risk management and compliance (GRC) solution to create value
• You can leverage a GRC platform to bring order to all this chaos.
NVM Express ® (NVMe TM) is the industry standard for high performance storage for client, enterprise and data center applications. The NVMe family of standards consist of:
• NVMeTM: Defining the architecture, queueing interface, and command set for direct attached PCIe® SSDs
• NVMe over Fabrics (NVMe-oFTM): Extending the NVMe architecture in a scalable manner over mainstream interconnects such as Ethernet
• NVMe Management Interface (NVMe-MITM): Specifying the management architecture and out-of-band interfaces for managing PCIe SSDs
In this webinar, Peter Onufryk, NVMe Board Member and NVMe Management Workgroup Chair, and Austin Bolen, Vice Chair of the NVMe Management Workgroup and co-author of the NVMe Management Interface Specification, will cover:
• Storage management and the motivation for developing the NVMe-MI specification
• The NVMe-MI architecture
• Out-of-band interfaces supported by NVMe-MI
• The NVMe-MI command set
• An overview of features that are being standardized in NVMe-MI 1.1 (i.e. enclosure management and the in-band tunneling mechanism)
At the end of this webinar you will have a good understanding of what NVMe-MI is, how it works, and how you can use it in your application.
Peter is currently a Fellow in the Performance Solutions Business Unit at Microsemi where he is responsible for NVM controller and PCI Express switch product architecture and validation.
Austin Bolen is a member of the Technical Staff at Dell EMC where he has been working as the NVM Express technologist for their PowerEdge server division for the past five years. He is Vice Chair of the NVMe Management Working Group and one of the authors of the NVM Express Management Interface Specification. He is also the Dell EMC representative in the PCI SIG Protocol Working Group which develops the PCI Express Base Specification where a primary object of his is enhancing the PCI Express ecosystem in support of NVMe.
Often, time management is seen as “big brother” to individual contributors. However, the information gathered from time entry provides valuable cost oversight to an organization. Not only can accurate time capture help to ensure accurate cost tracking, but it can assist in capitalizing work and creating innovation tax credits to help an organization’s bottom line. This session will show company’s how to accurately capture timesheets and use this information from a financial perspective.Read more >
Relying on third parties is how business gets done, however, third-party risk management is not without challenges. Using third parties increases risks associated with compliance, data security, and privacy. What are these risks? How would a third-party data breach impact your organization? Are they behind the curve on privacy? Should you be concerned about fourth parties?
In this webinar, Lockpath and SecurityScorecard discuss the risks vendors and third parties can bring to your company and strategies for managing them, including:
• The impact of increased regulatory oversight for vendors and third parties
• The potential and peril of third-party data breaches
• How third-party risk is being viewed as enterprise-wide risk
• The role of technology on the third-party and vendor risk management lifecycle
Open source adoption continues to rise, comprising between 60% and 80% of the average application codebase. Open source offers great benefits, but also introduce unique challenges which require dedicated tools to keep up with inventory, detect open source vulnerabilities and ensure license compliance.
Watch this webinar to see how Temenos, a market leading software provider to banks and other financial institutions shares how they automated their open source management with WhiteSource and what benefits they gained.
Here's your opportunity to ask an agile expert. Every organization undergoes different pain points during their agile transformation. We've been a part of many of those transformations, and our experts can offer insights and best practices for your organization to overcome those pain points. Join Laureen Knudsen, Advisor, Executive Management at CA Technologies, agile expert and co-author of Modern Business Management: Creating a Built-to-Change Organization and resident agile expert, on Tuesday, June 12, for your opportunity to ask the questions on your mind as your organization starts, expands and scales agile across multiple teams and departments.Read more >
Agile management has become necessary to survive, but is it enough to thrive? Many organizations have embraced Agile management on the assumption that if they upgrade existing products and services through cost reductions, time savings or quality enhancements for existing customers (i.e. operational Agility), they will realize financial gains. Owing to increased competitive pressures, this assumption often proves incorrect.
Drawing on the findings of his new book, The Age of Agile (AMACOM, 2018), Steve will show how proper portfolio management includes the next frontier of Agile management: Strategic Agility, i.e. generating innovations that create entirely new products and markets, and that turn non-customers into customers. Strategic Agility often offers the prospect of greater financial gains than merely improving the existing business. Steve will show what’s involved in achieving Strategic Agility, including a playbook for systematically generating market-creating innovations and the necessary shift in culture that is required.
Here's your opportunity to ask an agile expert.
Every organization undergoes different pain points during their agile transformation.
We've been a part of many of those transformations, and our experts can offer insights and best practices for your organization to overcome those pain points. Join Laureen Knudsen, Advisor, Executive Management at CA Technologies, agile expert and co-author of Modern Business Management: Creating a Built-to-Change Organization and resident agile expert, on Tuesday, April 17, for your opportunity to ask the questions on your mind as your organization starts, expands and scales agile across multiple teams and departments.
Michelle Major-Goldsmith and Simon Dorst of Kinetic IT will discuss the role of VeriSM in digital transformation, and its relation to ITIL and other service management practices.Read more >
Leveraging extensive research data, EMA vice president Dennis Drogseth will examine how ITSM is evolving to become a hub for all of IT, as well as for IT-to-business alignment. He will show unique insights into areas such as integrated asset management, integrated operations and war-room needs, as well as DevOps/agile, SecOps and ITSM’s growing role as a center for IT governance. The webinar will examine how and why this is coming about, as well as what technologies, organizational changes, and process adoptions are critical to furthering the role of ITSM as a hub for transformation. He will conclude with a discussion of the remaining, outstanding obstacles, along with some guidance on moving forward with success.Read more >
Achieving a single pane of glass for performance management has been an elusive goal, as organizations are faced with an increasingly complex mix of legacy, virtual and cloud technologies, as well as emerging operating models and evolving roles/skillsets.
But, monitoring the performance of digital business services demands more than visibility to just the end user experience, applications, or the underlying infrastructure. It requires an ability to automatically anticipate and isolate performance issues across a heterogeneous mix of technologies, devices and suppliers.
Digital business services are how end users experience IT, and that is how IT services must be managed. Achieving unified performance management will continue to be elusive until all stakeholders are aligned with this approach.
Join this webinar, as John Worthington, Director of Product Marketing at eG innovations, details some best practices for achieving the single pane of glass vision. Attendees will receive the related White Paper, "Best Practices for Achieving Transparency in Digital Business Services Monitoring".
In this webinar, you will:
-Learn how monitoring can be leveraged in continuous improvement and other transformative change programs
-See how converged APM/IPM can accelerate achievement of a single point of glass for performance monitoring
-Identify some best practices you can apply for achieving unified monitoring and improving organizational transparency
Transform your entire organization, not just a part of it. Take a modern look now that the world is focusing on business agility rather than thinking about team-level or even scaled Agile.
Many people and businesses believe that “doing Agile” will solve all their business and organizational problems. The truth is that “doing Agile”, especially team-level agility, is not the same as being an agile organization.
Authors Doug Dockery and Laureen Knudsen share their years of experience in transforming corporations and organizations to successfully compete and win in today’s fast-paced markets. Using proven techniques and stories of actual experiences in a multitude of organizations, Doug and Laureen relate what it takes to successfully transform your organization, as well as how to tell if your transformation is working.
This webinar details what you need to know to transform your business to deliver value and thrive. Coverage includes:
•What Agile means to an executive and the benefits you should be seeing
•The top failure modes and why so many transformations fail
•A framework for success, including an operational framework and a transformation framework
•How big data internal to a company is needed to successfully run a world-wide corporation today
•The definition of a modern business and what it looks like
The key to integrating ITSM and Infrastructure Configuration Management is awareness, expectation setting and communication. But with many CMDB/CMS implementations failing to deliver the value expected, organisations are realising how tough this can be and how complex and wide-ranging infrastructure asset and configuration management is. In this webinar David Cuthbertson looks at how to avoid de-scoped or failed Configuration Management implementations and how to put in place effective risk management processes.Read more >