- InnoSec is the winner of the EU commission Horizon 2020 grant based on its innovation in GDPR and cyber risk -
GDPR is an urgent issue that has companies scrambling to be compliant by May of 2018. Any organization that processes EU citizen data is in scope and the penalties are severe.
Alignment with the requirements can reduce the chances of triggering a Data Protection Authority (DPA) to investigate a company’s privacy practices after the GDPR takes effect in May 2018. DPAs can impose a fine on companies of up to 4% of annual global revenues for egregious violations of the GDPR. Member states can also add to these fines. The Netherlands, for instance, has more than doubled its own fining capacity to 10% of annual revenues. European privacy advocates are pressuring DPAs to fully exercise these new powers after May 2018.To manage this risk, multinationals should have a means to demonstrate alignment with the GDPR requirements and communication of this program with DPAs that have jurisdiction over their major European operations.
InnoSec’s GDPR solution provides privacy impact and risk assessments which measure the confidentiality and integrity of the system and the risk associated to it meeting articles 1,2, 5, 32, 35 and 36. Additionally, we provide a readiness gap analysis for managing, planning and budgeting for GDPR.
Most e-commerce, educational and multi-national organizations process EU citizen data and are in scope for GDPR. Moreover, most organizations are not ready according to Gartner and his means the race to the finish line requires as much automation as you can afford. InnoSec provides a means for companies to save money and time with their GDPR assessment and gap analysis offering.. Our GDPR offering automates the assessment process and provides a gap analysis readiness feature, that also ensures that organizations can plan, budget and manage their GDPR program.
Nicola Franchetto will discuss in a practical and business oriented way, the new provisions of the GDPR and how the PLA Code of Conduct supports compliance with the forthcoming EU Data Protection Legislation. More precisely, Franchetto will highlight the true privacy compliance “game changers” introduced by the GDPR and offer the audience practical inputs on how to set up a sound and effective corporate Data Protection Compliance Programme, which will also include having a PLA in place with Cloud Service Providers.
The journey towards a cloud native environment comes with its benefits but at the same time it has a lot of challenges. The main of which is how to put together different vendors who are not used to work with each other in one environment and make that work as a complete ecosystem. This session explores the questions and challenges that this journey brings and focus on the role of software and automation in it to make it as fast and as smooth as possible.
About the presenter:
Omar is the SDN solution owner for Cloud and Data Centers at Nokia. Omar has a broad experience in SDN and NFV technologies having worked on cutting edge projects for some of the biggest companies in the word. With a BSc in Computer Engineering and an MSc in Business Management he combines both very strong technical background with an excellent business awareness. Omar has two publications and two patents related to orchestrating telecom networks and modelling of network protocols.
Would you leave sensitive data out in the open making yourself a target to thieves looking for a victim? That is exactly what your business is doing if it fails to identify vulnerabilities in their business applications. Cyber attackers are looking at your business applications for security vulnerabilities so they can get access and wreak havoc. It’s time to find and fix security vulnerabilities before the hackers do. Wondering where to start and what to do? This webinar will help you build a comprehensive plan to minimize threats and protect your company. Join this webinar to hear application security experts: Discuss methods for scanning & evaluating potential security vulnerabilities in out-of-the box and home grown business applications Teach methods for quickly detecting and eradicating software flaws Make recommendations for how to choose and implement vulnerability scanning tools Explain how to reduce security vulnerabilities during internal application development Examine the widespread use of open-source code and how it may expose your business to security threats
9 months until the GDPR deadline - are you completely up-to-speed?
Our panel of data protection experts will be discussing the compliance considerations that you need to be assessing for May 2018 along with suggesting next steps from a cyber and general security standpoint.
We'll also be asking YOU at what stage you're at in terms of your preparations via a series of interactive benchmarks as we go through the session to get a sense of where the security community is at in terms of preparations.
GDPR and its May 2018 deadline are now fully the minds of the vast majority of security professionals and with massive fines on the horizon for non-compliance, now is a better time than ever to get to grips with the legislation and ensure that your organisation is secure and compliant.
It’s vital that your business has carried out the relevant preparations for compliance by then to make sure you don’t get whacked with a huge fine of up to £15m or 4% of your organisation’s global annual turnover.
Not only are there potentially huge financial repercussions, but leaving your business open to attack and your customers at risk can cause serious reputational damage.
Software defined and X as a Service are terms often used by organizations pushing “the next big thing”. Just like Cloud and DevOps before them, these are real movements and real principles that businesses and IT teams are embracing to deliver the services their own customer base have grown to expect. However, what does reality look like from what was proposed?
In this talk we look at what Software defined and “as a Service” mean to our customers, both independently and together as a consumption model for IT. We examine the benefits that could be realized as well as the challenges and shifts in behavior and policy that will be required to be successful.
How are you delivering “Software Defined Services” and what does it mean for your business, developers and in turn impact your customers? Join us as we summarize the journeys our customers are going on and what it means to them.
Innovation has been the buzzword of the new Asian economy. We are living in an age whereby you are either disrupting the way things are done, or are being disrupted by new business models or technologies. As business leaders in ASEAN, we have to stay ahead of the game in order to survive an environment that is VUCA – Volatile, Uncertain, Complex and Ambiguous. The speakers will provide insights to: -
- Why disruptive thinking is the key to UNCOVER the latent potential of your business here in ASEAN;
- How agile creation can UNLOCK massive commercial potential of Intellectual Property Rights (IPRs); and
- What ways IPRs can help you UNLEASH new value for your business.
In addition to speaking as Innovators and IP Specialists, the speakers will also be sharing about innovation and IP from their own entrepreneurship experience.
The European Union (EU) General Data Protection Regulation (GDPR) is designed to ensure the data privacy and protection of all EU citizens. It applies to any organisation – regardless of geographical location – that collects or processes personal data on EU residents, and institutes high penalties for non-compliance.
Join this interactive session to learn how you can improve your security to meet GDPR compliance by increasing your network traffic visibility. With the ability to monitor and send the right traffic to the right tools at the right time, the GigaSECURE® Security Delivery Platform can form the backbone of any GDPR compliance project.
In this presentation, you will learn how to bring pervasive visibility into network traffic that is needed to:
- Eliminate monitoring blind spots
- Vastly improve the accuracy and precision of data risk detection
- Help organisations meet the GDPR challenge
About the Presenter
Adrian is the Technical Director EMEA for Gigamon. He has had a keen interest in network security ever since, whilst working for Lucent Technologies, they introduced the Lucent Managed Firewall. Adrian also worked for leading web security firm CacheFlow, before joining NetScreen and, post-acquisition remaining with Juniper Networks where he held a number of senior sales engineering roles. Adrian joined Gigamon in 2016.
Many companies see the future in automated service, yet wonder where to start. The Service Automation Framework provides some easy-to-understand models that everyone can used to start the design and delivery of automated services. Used by many organisations around the world, it provides tools and techniques to achieve service automation.
In this BrightTalk webinar, we will focus on the technique of service automation blueprinting - a workshops approach for the the design of automated services. We will discuss the theory of the Service Automation Blueprint and will subsequently apply the techniques to a real world University case to make it as practical as possible. Don't miss this chance to learn more about Service Automation Blueprinting.
An introduction to Service Automation: http://pinkelephant.co.uk/brighttalk/?commid=259281
Service Automation Foundation: https://pinkelephant.co.uk/cursus/service-automation-foundation-2/
The EU General Data Protection Regulation (GDPR) was designed to harmonize data privacy laws across Europe, to protect and empower all EU citizens’ data privacy, and to reshape the way organizations across the region approach data privacy. Acknowledging identity threats like phishing and man-in-the-middle attacks, the GDPR applies to all companies processing and holding the personal data of those residing in the European Union, regardless of the company’s location.
An excerpt from the GDPR describes authentication as ‘key to securing computer systems’ and as the first step ‘in using a remote service or facility, and performing access control’. The document also outlines various GDPR-compliant authentication solutions, such as smart card, OTP push apps, and FIDO Universal 2nd Factor (U2F).
Yubico’s enterprise solution - the YubiKey - combines support for OpenPGP (an open standard for signing and encryption), FIDO U2F (a protocol that works with an unlimited number of applications), and smart card / PIV (a standard that enables RSA or ECC sign/encrypt operations using a private key stored on the device) all in one multi-protocol authentication device. This makes it a strong and flexible solution for companies required to comply with GDPR. Attend this webcast and learn:
•How GDPR will impact the way organizations worldwide store and access the personal information of EU citizens
•How to leverage open standards to achieve GDPR compliance for strong authentication
•How a multi-protocol authentication device protects organizations from phishing and man-in-the-middle attacks
The first half of 2017 was the tipping point for cyber threats in Northern Europe. Organizations had to defend themselves against two cyber attacks involving rapid spreading malware. The latest incident severely disrupted global enterprises, causing significant downtime and impacting their revenue.
Such high-profile, large-scale attacks show us that no organisation is safe from the reach of cyber-criminality. Post-GDPR, responding to these attacks will become all the more critical as breaches will have to be reported to the relevant regulatory body. By understanding your current security posture - internal processes and technology – combined with the external threat landscape – organisations can prepare themselves should a breach occur.
In this webinar, you will learn how to assess your risk profile, evaluate your operational strengths and weaknesses as well as your tactical approach to responding to co-ordinated, targeted attacks.
In regulated industries, such as Financial Services, Government and Healthcare, forms and signatures are critical components of enrolment and onboarding interactions. Yet most services still rely on forms and signatures that function poorly on mobile—the very place most consumers spend their time. Creating and updating high volumes of forms in a timely manner can also be a huge challenge.
Join us to learn how Adobe Experience Manager Forms and Adobe Sign can help transform complex forms-based transactions into streamlined and compliant experiences that accelerate business and deliver better customer service.
In this webinar, learn how to:
•Provide an end-to-end digital form filling and signing experience across any channel
•Integrate e-signatures across the document process with Adobe Sign and Adobe Experience Manager integration
Companies around the world have adopted the Demand Driven MRP (DDMRP) methodology and experienced substantial improvements in customer service, reduced lead times and lower inventories. Introduced to the market in 2011, the DDMRP methodology is experiencing rapid adoption around the globe as companies from a wide range of segments are finding it unlocks substantial improvements in their Supply Chain Performance.
Tata Consultancy Services(TCS), together with Demand Driven Technologies will host a webcast that will introduce you to the core concepts of DDMRP and highlight implementation case studies. We’ll also include a short demonstration of Replenishment+, the world’s leading DDMRP compliant software solution.
In this webinar you will learn:
1. Why outdated systems like MRP are inappropriate for today’s highly variable and uncertain landscape
2. The five key components of the Demand Driven MRP (DDMRP)
3. Recent DDMRP case studies from across globe and industry segments
The ICT sector is moving us inexorably towards a software-enabled digital world, but many still fail to understand the power of this trend, how it is going to impact/benefit the ICT Industries and infrastructures delivering them.
Among topics discussed will be:
- Present and future impact of Software Defined technologies on IT (challenges and opportunities)
- How Software-Defined is enabling the digital transformation
- Best practices and recommendation on adopting software-defined technologies with the future in mind.
This Webinar is aimed at IT professionals and CIOs/CDOs/CTOs seeking to understand more about how software-defined impacts the present and future of enterprises.
SAP Indirect Usage costs are no longer just theory. A milestone judgement in the UK courts has confirmed SAP’s right to charge customers for Indirect Usage. But what is Indirect Usage? How big is the risk of unbudgeted costs? And what can you do about it? SAP licensing experts from Snow Software will explore the recent legal ruling and what it means for SAP customers around the world, providing insight and a simple five-step plan on how to optimize SAP access and licensing before it’s too late.
Developments for new therapeutics to target various aspects of auditory system dysfunction is on the rise within the drug development industry. Join Rachel as she reviews nonclinical auditory safety programs, including standard and non-standard endpoints. She will also share in-depth answers to common questions regarding species selection and study timelines.
You’re preparing for GDPR. You’re auditing your information. You’re reviewing your security systems. But is this enough? Join us at Part Two of this BrightTALK webinar series where Symantec experts and a guest speaker from Forrester discuss how to ensure your security strategy is primed for GDPR.
You’ll learn the proven milestones to bring together the people, policies and processes that will make your GDPR preparations more successful – and how other businesses have done so.
Other topics will include:
•Identifying gaps in your strategy
•How to prioritise remediation and investments
•How to protect user identities and authentication so that they can’t be used to break into your personal and sensitive information.
Join Jabez Tan, Keynote speaker at Data Centre World Hong Kong and Cloud Expo Asia, as he takes an in-depth look at the primary metrics that tell the story of the Hong Kong colocation market.
We track the market’s size and growth trajectory and provide a five-year CAGR projection, along with a detailed analysis of the underlying supply and demand dynamics. Our proprietary methodology takes this analysis to a number of levels.
First, colocation supply is measured from both a space and power perspective.
Second, all market metrics – including space, power and revenue – are classified and then measured as either retail or wholesale colocation.
Third, we size the market – again, from both a retail and colocation perspective – on an aggregated and sub-regional basis.
This webinar is an excellent resource for any service provider, investor or end user (service provider or enterprise) that is looking to understand and project the data centre market in Hong Kong or find a service provider.
The General Data Protection Regulation (GDPR), a set of rules governing the privacy and security of personal data that is being implemented by the European Commission, is going into effect in May, 2018.
This means your company, and every other company in the world are considering:
- Does GDPR affect my organization and how
- What are the cybersecurity and privacy implications of GDPR
- What happens if I don't comply
Join this panel of top privacy and security experts as they discuss the state of identity, privacy and cyber security in the context of GDPR.
- Michelle Dennedy, VP & Chief Privacy Officer at Cisco
- Ariel Silverstone, Vice President of Security Strategy, Privacy and Trust at GoDaddy
- Paul Rosenzweig, Principal at Red Branch Consulting
The volume of data streaming into the data center has been growing exponentially for decades. Bandwidth requirements are expected to continue growing 25 percent to 35 percent per year. At the same time, lower latency requirements continue to escalate. As a result, the design of services and applications—and how they are delivered—is rapidly evolving.
Instead of a single dedicated server, information requests coming into the data center are now fulfilled by multiple servers cooperating in parallelThe traditional three-tier network is quickly being replaced by spine-and-leaf networks. As a result, the physical infrastructure must be able to support higher link speeds and greater fiber density while enabling quick and easy migration to new more demanding applications.
This webinar will address:
Solutions, support & decisions
40G or 25G lanes?
Preterminated vs field-terminated cables
Duplex or Parallel transmissions
Singlemode, multimode or wideband multimode fiber?
Attendees with earn one BICSI Continuing Education Credit for attending.
Software-defining the WAN is just one component to simplifying and cost reducing the enterprise branch. But why limit your transformation to just the WAN? Are you aware of the additional appliance and service consolidation that you can achieve when you look beyond just WAN connectivity? Have you considered the implications of security when it comes to direct Internet access (DIA), and the complexity that it can add?
Join us for this live webinar as we discuss how a software-defined branch (SD-Branch) is the logical step in your WAN/branch transformation.
In this webinar, you will come to understand:
•Implications of security due to SD-WAN-enabled direct Internet access
•Operational and financial benefits of virtualizing the full branch
•How SD-WAN is only one part of your next-generation branch and WAN architecture
Os dados do último Relatório Global de Fraude & Risco da Kroll demonstram que as empresas brasileiras ainda apresentam deficiências na detecção de fraudes, o que contribui para que boa parte delas passe despercebida.
Junte-se aos especialistas da Kroll para uma discussão sobre as maneiras mais eficientes de estruturar uma investigação interna, com exemplos reais do trabalho desenvolvido pela principal consultoria global de gestão de riscos corporativos e investigações.
With the proliferation of analytics expanding across every function of the enterprise, the need for broader access to data, experienced data scientists and intuitive tools for non-technical users to produce reports and make discovery is growing exponentially.
To meet this growing demand, organizations need to invest in the tools, build processes and enable users to be self-sufficient to avoid bottlenecks while at the same time maintaining the governance and data security standards required to safeguard this critical corporate asset.
This webinar will illustrate how organizations are solving these challenges and enabling users to both access larger quantities of existing data as well as add new data to their own models without negatively impacting the quality, security or cost to store that data. It will also highlight some of the cost and performance benefits achieved by enabling self-service data management.
Join us for this next session of “Under the Hood of Vertica” as we take a deep dive into Vertica’s integration with Apache Spark, an in-memory data processing engine.
Our technical experts will discuss Vertica’s latest support for Apache Spark version 2.1, review common use cases for each, and demonstrate how to leverage Vertica and Spark together to enable continuous, real-time processing and transformation of data streams.
Many sales leaders struggle to get their salespeople to successfully use LinkedIn to grow their business. LinkedIn Expert Brynne Tillman and Sales Execution Expert Steven Rosen will share their formulas for success.
This webinar will cover two perspectives to a Crush your sales numbers using LinkedIn;
1. The practical and tactical activities to leveraging LinkedIn and
2. 3 Steps to effectively execute your LinkedIn strategy