Hi [[ session.user.profile.firstName ]]
Sort by:
    • Defending Against Cyberthreats: CyberEdge's 2016 Cyberthreat Defense Report Defending Against Cyberthreats: CyberEdge's 2016 Cyberthreat Defense Report Steve Piper, Co-founder and CEO of CyberEdge Group, Mike Reagan, CMO of LogRhythm Upcoming: Dec 15 2016 12:00 am UTC 60 mins
    • Despite record security spending, successful cyberattacks are on the rise. Seventy-six percent of organizations around the globe were compromised by a successful cyber attack in in 2015—up from 62% in 2014.

      Savvy IT professionals know that it’s no longer a question of if their network will become compromised, but when. Smart CIOs and CISOs must strike a balance between threat prevention and detection investments, as both are critical in the fight against today’s sophisticated threats.

      Steve Piper, CEO of the information security research firm CyberEdge Group, is joined by Mike Reagan, CMO of LogRhythm, to share the findings of the 2016 Cyberthreat Defense Report.

      This webinar will reveal the current security posture of today’s organizations, gauge perceptions about cyberthreats, and disclose future plans for improving security and reducing risk.

      You’ll discover:

      • Deep insights into how IT security professionals perceive cyberthreats
      • What they’re doing to defend against threats
      • How security information and event management (SIEM) can be implemented within an organization to increase confidence and decrease the time it takes to detect and respond to cyberthreats

      See how you compare. Register now for a 360-degree view of the threats, response plans, processes and investments that organizations are making in 2016.

      Read more >
    • Defending Against Cyberthreats: CyberEdge's 2016 Cyberthreat Defense Report Defending Against Cyberthreats: CyberEdge's 2016 Cyberthreat Defense Report Steve Piper, Co-founder and CEO of CyberEdge Group, Mike Reagan, CMO of LogRhythm Recorded: May 11 2016 6:00 pm UTC 60 mins
    • Despite record security spending, successful cyberattacks are on the rise. Seventy-six percent of organizations around the globe were compromised by a successful cyber attack in in 2015—up from 62% in 2014.

      Savvy IT professionals know that it’s no longer a question of if their network will become compromised, but when. Smart CIOs and CISOs must strike a balance between threat prevention and detection investments, as both are critical in the fight against today’s sophisticated threats.

      Steve Piper, CEO of the information security research firm CyberEdge Group, is joined by Mike Reagan, CMO of LogRhythm, to share the findings of the 2016 Cyberthreat Defense Report.

      This webinar will reveal the current security posture of today’s organizations, gauge perceptions about cyberthreats, and disclose future plans for improving security and reducing risk.

      You’ll discover:

      • Deep insights into how IT security professionals perceive cyberthreats
      • What they’re doing to defend against threats
      • How security information and event management (SIEM) can be implemented within an organization to increase confidence and decrease the time it takes to detect and respond to cyberthreats

      See how you compare. Register now for a 360-degree view of the threats, response plans, processes and investments that organizations are making in 2016.

      Read more >
    • HP Cyber Risk Report 2015: The Past is Prologue HP Cyber Risk Report 2015: The Past is Prologue Jewel Timpe, Senior Manager- Threat Research, HP Security Research Recorded: Jun 9 2015 4:00 pm UTC 27 mins
    • In the world of information security, the past isn’t dead; it isn’t even the past.

      The 2015 edition of HP’s annual security-research analysis reveals a threat landscape still populated by old problems and known issues, even as the pace of new developments quickens. In 2014, well-known attacks and misconfigurations existed side-by-side with mobile and connected devices (the “Internet of Things”) that remained largely unsecured. As the global economy continues its recovery, enterprises continued to find inexpensive access to capital; unfortunately, network attackers did as well, some of whom launched remarkably determined and formidable attacks over the course of the year.

      The 2015 edition of the HP Cyber Risk Report, drawn from innovative work by HP Security Research (HPSR), examines the nature of currently active vulnerabilities, how adversaries take advantage of them, and how defenders can prepare for what lies ahead. Jewel Timpe, HPSR’s senior manager of threat research, describes the report’s findings and explains how this intelligence can be used to better allocate security funds and personnel resources for enterprises looking toward tomorrow.

      Read more >
    • The Staffing Advantage Report: How to Get Your Staffing Firm to the Top The Staffing Advantage Report: How to Get Your Staffing Firm to the Top Eric Gregg, CEO, Inavero Recorded: Nov 10 2016 6:00 pm UTC 53 mins
    • Did you know that the average client works with three different staffing firms? The majority of them (59 percent) say it gives them better access to talent because if one firm can’t help them, they have other options, according to CareerBuilder and Inavero’s 2016 Staffing Advantage survey.

      It’s safe to say the competition is fierce among staffing firms vying for business today.

      That’s why CareerBuilder has partnered with Inavero to bring you exclusive market research and industry insights to help you go inside the minds of both candidates and clients to better understand the competitive staffing landscape.

      The 2016 Staffing Advantage Webinar hosted by Kyle Braun, CareerBuilder Staffing and Recruiting Group, President, CareerBuilder, and Eric Gregg, CEO, Inavero will also help you answer questions such as:

      - What are your competitors doing?
      - How can you outpace the best staffing firms out there?
      - How can you run your staffing firm the smartest way?
      - How can you win business?
      - How can you win over candidates?
      - How can you use technology as a competitive advantage?

      Read more >
    • HP Cyber Risk Report 2015: The Past is Prologue HP Cyber Risk Report 2015: The Past is Prologue Jewel Timpe, Senior Manager- Threat Research, HP Security Research Recorded: Mar 12 2015 5:45 pm UTC 28 mins
    • In the world of information security, the past isn’t dead; it isn’t even the past. The 2015 edition of HP’s annual security-research analysis reveals a threat landscape still populated by old problems and known issues, even as the pace of new developments quickens. In 2014, well-known attacks and misconfigurations existed side-by-side with mobile and connected devices (the “Internet of Things”) that remained largely unsecured. As the global economy continues its recovery, enterprises continued to find inexpensive access to capital; unfortunately, network attackers did as well, some of whom launched remarkably determined and formidable attacks over the course of the year.

      The 2015 edition of the HP Cyber Risk Report, drawn from innovative work by HP Security Research (HPSR), examines the nature of currently active vulnerabilities, how adversaries take advantage of them, and how defenders can prepare for what lies ahead. Jewel Timpe, HPSR’s senior manager of threat research, describes the report’s findings and explains how this intelligence can be used to better allocate security funds and personnel resources for enterprises looking toward tomorrow.

      Read more >
    • 60 Seconds with Seema Suchak (Reports) 60 Seconds with Seema Suchak (Reports) Seema Suchak Recorded: Jan 13 2015 3:55 pm UTC 2 mins
    • Seema Suchak, ESG Analyst, explains Schroders’ new approach to reporting on sustainable investments:

      -Schroders believes that reporting on how we’re making investments sustainable is increasingly important to clients, so we’ve released a new version of our quarterly responsible investment report

      -The new report showcases interesting and successful engagement examples, such as our recent liaison with the CDP’s Carbon Action initiative, which engages with companies that don’t have the right carbon reduction targets in place and how this can be improved

      -Also included are our recent thematic reports, focussing on tax as an investment risk and governance around banks

      Read more >