Hi [[ session.user.profile.firstName ]]
Sort by:
    • How Software Eats Hardware in the Datacenter: Reducing Cost and Complexity
      How Software Eats Hardware in the Datacenter: Reducing Cost and Complexity Andy Ryan, Cloud Solutions Architect at vArmour Recorded: Sep 1 2016 5:00 pm UTC 35 mins
    • INTRO:

      As organizations move to virtual data centers and multi-cloud environments in a dangerous threat climate, they are faced with new security challenges they must overcome. But, they must do this without exponentially increasing the manpower, products, or resources they need, so they still get the most of their valuable security budgets. These challenges include:

      -Improving visibility inside data centers and cloud
      -Reducing the attack surface
      -Maintaining regulatory compliance standards.

      WHAT'S IN THIS WEBINAR:

      vArmour will explore trends in data center security that include the rise of software to replace firewalls inside the data center, segmentation and micro-segmentation as security techniques, and shifting ideas about software defined networking that:

      -Eliminate under-utilized zones and choke points
      -Avoid costly hardware refresh cycles and on-going maintenance
      -Lower the time it takes to see and stop threats
      -Reduce the time and complexity to process security changes
      -Increase speed of secure application delivery

      ABOUT THE SPEAKERS:

      Andy Ryan, Cloud Solutions Architect at vArmour
      https://www.linkedin.com/in/andyr

      Read more >
    • CIP – Significantly Reducing Costs in Outpatients
      CIP – Significantly Reducing Costs in Outpatients Chris Rodwell, Robin Kilner Recorded: Oct 27 2015 2:00 pm UTC 62 mins
    • The NHS Five Year Forward View requires £20bn - £30bn cost improvements by 2020. Patient care requires continuous improvements to keep pace with increasing expectations on services. This calls for Trusts to improve processes, while reducing actual delivery costs.

      Trusts need to understand the positive financial impact of an Outpatient Process Redesign. Winscribe’s healthcare process experts Chris Rodwell and Robin Kilner show how this can be achieved. The purpose of the redesign is to identify and write an action plan to reduce the costs of supporting outpatients by a minimum of £1m per annum for a small to medium trust. More for larger trusts.

      Cost savings can be made as a result of:-
      •Better document creation – getting it down to seconds per appointment for the clinician
      •Reducing costs of administration for discharge / clinic letter production – reductions of 50 – 60% possible
      •Improve document sharing (time taken) and document TAT – reduces admin further
      •Accuracy – right first time
      •Reduced cost per letter - reductions of 50 – 60% possible

      This webinar is to share this approach with NHS Finance Managers and Directors. We will examine actual case studies and show the savings that can be made, in the current financial year and over a 5 year plan. Winscribe’s healthcare process experts Chris Rodwell and Robin Kilner show how this can be achieved.

      Read more >
    • Reducing Open Source Risk and Remediation Costs Early in the SDLC
      Reducing Open Source Risk and Remediation Costs Early in the SDLC Pat Durante, Senior Director Education Services; John Beaudoin, Senior Instructional Designer Recorded: Feb 22 2017 4:00 pm UTC 74 mins
    • Increasingly, organizations worldwide are implementing open source security and license risk assessment capabilities early in the software development lifecycle when the cost to remediate issues is lowest. This webinar will demonstrate Black Duck Hub’s effectiveness in providing comprehensive risk assessments when used in combination with our Eclipse IDE plugin, Build Tool, and CI Tool integrations. Additionally, we'll review valuable new features in Black Duck Hub 3.5.
      You’ll also learn:
      - How to improve the accuracy of your open source inventory by leverage open source dependency discovery techniques for build tools and package managers
      - Options for incorporating Hub scanning into your Continuous Integration environments
      - How to track remediation tasks using the Hub-Jira integration
      - How to streamline your component review process
      - Use cases for scanning binary repositories such as Artifactory

      Read more >
    • Reducing Threats through Improving Identity Security
      Reducing Threats through Improving Identity Security David Coxe, Co-Founder, Criterion Systems and Co-Founder & CEO of ID DataWeb Recorded: Dec 12 2016 6:00 pm UTC 41 mins
    • Cyber threats are increasing in frequency and complexity, and all industry segments are vulnerable. Join this presentation to learn the advances in identity security and privacy, and how you can protect your organization in 2017.

      Presenter:
      David Coxe is the CEO of ID DataWeb, Inc. (IDW) and was the Principal Investigator for the Criterion Systems NSTIC pilot program. He is also co- founder of Criterion Systems, a successful IT services contractor that provides information security, cloud computing, software development and other services to civilian agencies, DoD, and the Intelligence community. David has 20 years identity management experience and is currently very active in the development and implementation of attribute exchange trust frameworks. He co-chaired the Attribute Exchange Working Group (AXWG) at the Open Identity Exchange (OIX) for implementing the business, legal, technical, policy/privacy and assessor/certification requirements for Attribute Exchange (AX) Trust Frameworks.

      Read more >
    • Reducing Risks by Mitigating Vulnerabilities
      Reducing Risks by Mitigating Vulnerabilities Craig Hinkley, WhiteHat Security; Preston Hogue, F5 Networks Recorded: Nov 16 2016 2:30 pm UTC 50 mins
    • Build an Active Application Defense System
      Web applications accounted for an astounding 40% of last year’s security breaches. The challenges of securing legacy systems, third-party apps, and the extensive shadow IT landscape can be challenging, to put it mildly.

      But here’s the good news: The combined F5 and WhiteHat Security approach to web application security represents a powerful new way for organizations to defend against application-level attacks.

      Companies are constantly developing new applications, and it’s expensive to stop and patch as soon as a new vulnerability is found. Additionally, it may not be practical to remediate every finding due to issues with legacy code, third-party integrations, or other inherited limitations.

      But the integration of F5 Networks and WhiteHat Security technology helps you more quickly identify and remediate vulnerabilities in your web applications. By automating updates to the web application firewall, you can ease the burden of management and reduce costs, while ensuring that your security posture remains strong.

      Read more >
    • The Ability-to-Pay Defense: A Strategy for Reducing Criminal Fines
      The Ability-to-Pay Defense: A Strategy for Reducing Criminal Fines Seth Farber, Trey Nicoud, Basil Imburgia, Jeff Litvak Recorded: Oct 26 2016 5:00 pm UTC 82 mins
    • In recent years, criminal fines and penalties have risen drastically as a result of price-fixing and bid-rigging conspiracies uncovered among automotive parts manufacturers. While companies face these mounting fines, they need not accept the fine initially imposed. The United States Sentencing Guidelines do allow for a reduction of a criminal fine based on a company’s inability to pay. This webcast seeks to inform practitioners on the considerations of this ability-to-pay defense, strategies and process. As an illustration, this webcast includes a case study analyzing a company’s ability to pay a fine resulting from antitrust violations; however, the described methodology has other applications. Additional arenas where this defense has relevance include environmental clean-up costs, healthcare fraud, securities and commodities fraud, as well as FCPA and sanctions violations.

      The session will provide insight into the financial analyst’s role in evaluating the company’s financial status and the basis of the framework for the ability-to-pay argument. As part of the case study, the session will walk through an ability-to-pay model including analysis of projected free cash flow and the strength of the company’s balance sheet. Lastly, the session will address the importance of the financial expert’s role in discussions with the DOJ and its financial expert.

      Read more >
    • The Blind Men and the Elephant: Reducing Risk with Hadoop Visibility
      The Blind Men and the Elephant: Reducing Risk with Hadoop Visibility Eric Hansleman 451 Research and Jim Waring BMC Recorded: Sep 22 2016 4:00 pm UTC 51 mins
    • Hadoop is a wonderful framework that can drive insight into a range of problems, but administrators can be blind to performance, utilization and cost issues of cluster deployments. There’s risk in sizing initial deployments properly, as well as determining optimal capacity over time. Without sufficient visibility, job performance can suffer and costs can escalate. Keeping a critical resource running effectively and being able to plan for the future requires intelligent decision making capabilities that many Hadoop deployments lack. This webinar will look into common problems that affect clusters and ways to detect issues early and head off long term problems. We’ll dig into capacity management and ways to deal with ever increasing demands for Hadoop resources.

      Key points:

      • Understand initial deployment challenges
      • Handling cluster growth
      • Working to meet increasing pressure on storage and job density
      • Planning for capacity growth and extension to cloud

      Read more >
    • Reducing uncertainty in risk models with GfK boundary data – a use case by JBA
      Reducing uncertainty in risk models with GfK boundary data – a use case by JBA Samera Owusu Tutu Recorded: Sep 7 2016 2:00 pm UTC 67 mins
    • Uncertainty is a constant theme in the reinsurance industry, especially in disaster-prone regions for which detailed exposure data is lacking. How can re/insurers make meaningful risk assessments and write more business in these areas?

      This GfK webinar answers this question by showing how CRESTA zones can be used to estimate exposure for aggregated risk portfolios in rapidly emerging markets. JBA Risk Management offers a behind-the-scenes look at how to assess flood risk at the CRESTA level in the absence of detailed exposure data. With a focus on the Asian markets of Thailand, Malaysia, and China, the webinar provides a template for using GfK’s CRESTA boundary data as part of an approach to estimate risk in markets that lack detailed exposure information.

      What you’ll learn from this webinar
      •How GfK boundary data supports risk assessment in emerging markets
      •How JBA uses GfK’s geodata to evaluate flood risk in Malaysia and China’s Pearl River Delta
      •What to look for when acquiring boundary data for reinsurance applications

      Who should attend
      • Reinsurers and reinsurance company representatives
      • Underwriters, brokers, cat modelers and GIS users working in the reinsurance industry
      • Anyone interested in how GfK boundary data helps with risk evaluation in new and existing markets

      The webinar is hosted and moderated by Global Reinsurance and includes presentations by Iain Willis, Technical Director at JBA Risk Management; Christopher Guider, Marketing Manager at GfK; and Christine Werner, Senior Consultant for Financial Services at GfK.

      Read more >