Every day, organizations are impacted by cyber-attacks. Misleading indicators, complex security incidents, and evolving intruder patterns require new threat intelligence and analytics. With millions of data to analyze, every second counts - augment your security tools with real-time threat hunting capabilities and new research insights.
Join experts Jason Stamper, Analyst for 451 Research, and Eric Tran-le, CMO for Logtrust, as they affirm how essential real-time threat hunting is for cybersecurity teams, and share new insights and tools for combatting attacks.
• Learn new trends in machine data analytics from 451 Research
• Pinpoint cybersecurity attacks and unusual behavior
• Visualize an attack graph
• Detect intruder paths and potential vulnerabilities
• Leverage a single source of truth
With more than 4.5 million digital devices in the field, delivering billions of data streams for TV and Video On-Demand services, this Fortune Global 500 Telco needed to improve Quality of Experience (QoE) and Quality of Service (QoS) – in real-time. Because every second counts and time-to-insight matters, managing the volume, variety and velocity of data streaming in real-time, and analyzing against historical data needed to be effortless, seamless and lightning fast. Using Logtrust’s Big Data-in-Motion technology, Tran-Le will showcase how the Telco giant analyzes in real-time billions of data for 20 million customers each day, and has reduced call volume, improved QoE/S, and saved millions of dollars a year.
• Understanding current IoT data management challenges
• Overcoming the technology and data scalability wall
• Analyzing past and present “events of interest” across millions of IoT devices
• Making sense out of chaos for time-sensitive IoT/Big Data applications for rapid time-to-insight and value
Eric Tran-le is the Global Chief Marketing Officer at Logtrust, a Big Data-in-Motion as-a-Service solution provider for fast data, big data analytics. He has more than 20+ years’ experience in both product management and operational system engineering for managing private and native cloud applications at scale. Tran-Le is leading real-time threat hunting, security and IoT analytics initiatives at Logtrust. Formerly, Tran-Le was VP Oracle Management Cloud Services, VP Enterprise Cloud Management, and VP Product Management at Oracle, as well as Network Business Unit Manager at Microsoft.
Audiology Grand Rounds-Quinn TranRead more >
The fatty acid composition of a fat or oil is most commonly assessed by gas chromatography, following conversion of the fatty acids methyl esters. The current most refined analytical methods for the quantitation of trans fatty acids rely on the separations provided by long cyanopropyl siloxane capillary columns. The introduction of capillary columns coated with ionic liquids, such as Supelco SLB-IL111, provide an alternative separation tool characterized by a higher stationary phase polarity and selectivity toward geometric and positional isomers of unsaturated fatty acids. The use of these novel capillary columns can provide more refined separations of complex lipid samples. As a result, most conjugated linoleic acid isomers (including t7,c9- and c9,t11-18:1 FA) can be quantitated in a single separation using a 100 m SLB-IL111 capillary column and most 18:1 FA positional and geometric isomers can be separated using a 200 m SLB-IL111. Ionic liquid columns provide more detailed FA profiles, especially for unsaturated fatty acid positional/geometric isomers.Read more >
The Health Insurance Portability and Accountability Act of 1996 (HIPAA) requires different rules in the cloud era for staying compliant when it comes to dealing with Protected Health Information (PHI). As a result, IT leaders must adhere accordingly when operating on a public cloud infrastructure, such as Amazon Web Services (AWS), to prevent potential violations and monetary fines.
In this live virtual co-panel discussion by AWS, CorpInfo, and CloudCheckr, we will explore:
- What rules affect HIPAA compliance and governance in the cloud and who must comply
- Why HIPAA compliance requires continuous monitoring and logging of network and information assets
- How to achieve HIPAA compliance with AWS HIPAA Quick Start
- Why organizations need to know and understand AWS’ Shared Responsibility Model to remain compliant in the cloud
- How tools can help validate your security posture and support auditing requirements
Spireon, an IoT company, needed a BI platform that could turn over 3 billion records of data, with a projected growth rate of 3x per year, into operational insights both for their internal teams as well as their customers.
Watch this webinar and learn:
How Spireon used Birst to transform semi-structured data into analytic format
Best practices in approaching analytics for data volumes with exponential growth
How analytics is used internally by product and customer success teams
How Spireon has disrupted the IoT market by creating a data product
Even behind the firewall, hackers can access your data through network printers - find out why and what to do.Read more >
History teaches us that when things go seriously wrong in the legal and financial world the effects can take Nations to the edge of the abyss and spell personal and economic disaster for citizens and organisations not protected. The scandals of sub-prime mortgages, Libor and Payment Protection Insurance (PPI) provide a sobering reminder of what happens when professionals don’t follow the rules. This presentation exposes a risk that is often unseen – translation.
In his presentation, David will:
• Discuss the factors that contributed to recent financial scandals;
• Ask why scandals such as PPI went undetected for so long despite being identified a decade earlier.
• Highlight the nature of threat society faces from financial crime; and the new tougher enforcement approach being adopted by regulators.
He will then shed light on a major compliance risk that has had little or no coverage to date: The use of translation and interpreting to facilitate fraud and money laundering and misinform customers of their rights and obligations.
He will consider the potential scale of the problem and outline weaknesses in current practices in the professional services sector that poses a significant risk.
David advocates ‘drawing a line in the sand’ and offers 5 steps to help regulated professionals to defuse the multilingual time bomb before it explodes into another major scandal.
Recent studies have shown that at least 20% of the animal cell cultures currently in use in the US are contaminated by either microorganisms or other cell lines. This three part live, on-line seminar series will review the scope of this major problem and examine some of its causes and techniques for avoiding it. It will also explore some key, easy to employ strategies for preventing these losses by careful culture management.
This webinar will discuss good aseptic technique: developing a practical approach to aseptic technique; reducing day-to-day contamination problems in the lab; and helpful hints for avoiding contamination.
Defending against today’s sophisticated attacks requires a shift in security investments from prevention to a balanced mix of prevention, detection, and response. The challenge is how to make this shift given limited resources and expertise.
The RSA Advanced Cyber Defense Practice can help by improving your breach readiness, response and resiliency with a three-prong approach: optimize the use of preventive controls, reduce attacker free time, and reduce the time it takes to execute an appropriate response.
Join this webcast and learn how to:
•Enhance your security posture
•Prepare for and respond to security incidents, and evolve in line with the threat environment
•Develop strategies and tactics for building and improving your security operations programs, including designing and optimizing a security operations center (SOC)
•Layer in advanced capabilities, such as intelligence and analytics, to develop a more agile and proactive security monitoring function
Unify your security strategy, operations and technology implementations, and produce an actionable security improvement plan with the help of the RSA Advanced Cyber Defense Practice. Learn more at this important webcast.
You will learn about the latest new technical features and benefits of the just released Nexus 1010-X v1.4.Read more >
Please join us on Thursday, December 3, 2015, from 1:00 to 2:00 pm Central as we present the free EDRM webinar, “Practical Options for US Litigators and Investigators Dealing with EU Data,” sponsored by EDT.
Since early October when the Court of Justice of the European Union deemed the Safe Harbor regime for European data transfers to the US to be invalid, many organizations have struggled to evolve their information management strategies to accommodate the changing international data privacy landscape.
While there are concerted diplomatic efforts underway to establish a robust new trans-Atlantic data transfer framework, the negotiations, are intrinsically linked to personal privacy and national security perspectives so resolution and clarity may take some time. Many litigators and investigators are, in the meantime, reeling in murky waters of uncertainty.
How effective are the alternative data transfer mechanisms? What are their limitations and how can these be addressed? Are there any new options available? Are different strategies needed for investigations as compared with discovery for litigation?
Join our EDRM webinar at 1pm on 3rd December 2015 to hear our international panel canvas key considerations and practical options for trans-Atlantic litigation and investigations in light of these recent developments.
Blending of imported and domestic coal is becoming more important. Until recently, coal blending in power stations was adopted mainly to reduce the cost of generation and increase the use of indigenous or more readily available coal. Low-grade (high ash) coal can be mixed with higher grade (imported) coal without deterioration in thermal performance of the boiler, thus reducing the cost of generation. As coal markets change, new reasons for coal blending are becoming apparent. As indigenous coals become less available, of lower quality or more expensive to mine in some regions, blending of imported coals becomes necessary. It can be challenging to ensure that the resulting blend will maintain plant output without damaging the boiler.
In some cases coal blending is used as a form of pollution control, such as the combination of inexpensive high sulphur coals with more costly low sulphur coals to ensure compliance with sulphur emission limits. It is even possible to blend different coal types to maximise mercury emission reduction.
Many methods of coal blending are used. Coals can be blended at the coal mine, at the preparation plant, trans-shipment point, or at the power station. The method selected depends upon the site conditions, the level of blending required, the quantity to be stored and blended, the accuracy required, and the end use of the blended coal. Normally in large power stations handling very large quantities of coal, the stacking method with a fully mechanised system is followed.
In this webinar Lesley discusses the different reasons and priorities for coal blending. She summarises the methods of coal blending, from coal characterisation though to mixing and storage methods, including some case studies of challenging situations.