Wondering what selection criteria you should consider when researching and identifying a new ATS? Download this checklist to learn what you should consider now.
This document provides an overview of security best practices when using AWS. It discusses AWS' shared security responsibility model and outlines key AWS security features such as IAM, encryption, firewalls, and monitoring tools. Recommendations are given for building secure infrastructure on AWS including account management, network segmentation, asset management, and monitoring. Case studies and additional resources are also referenced.
The document discusses database security. It notes that a DBA (Database Administrator) is responsible for database security, including access control, account creation, support services, privilege granting/revocation, backup/recovery, and ensuring data integrity, security, and privacy. Major database security threats include excessive privileges, privilege abuse, input injection, malware, weak audit trails, exposed storage media, exploitation of vulnerable databases, unmanaged sensitive data, and limited security expertise. Database security aims to ensure confidentiality, integrity, and availability of data through measures like access control, inference control, flow control, and data encryption.
Este documento describe la norma ISO/IEC 20000 y cómo puede mejorar la gestión de servicios TI de una organización. La norma establece requisitos para un sistema de gestión de servicios TI efectivo e integrado. Cubre áreas como planificación, implementación, prestación y mejora continua de servicios, así como procesos de gestión de relaciones, resolución de problemas e incidencias, control de cambios y entrega. Siguiendo los lineamientos de esta norma, las organizaciones pueden gestionar sus servicios TI de forma más estratégica y aline
Information Security Principles - Access Controlidingolay
The document discusses various concepts related to access controls and authentication methods in information security. It covers identification, authentication, authorization, accountability and different authentication factors like something you know, something you have, something you are. It also discusses access control models, biometrics, passwords and single sign-on systems.
The document discusses key concepts in IT service management (ITSM) and ITIL. It covers the core ITSM components including service strategy, service design, service transition, service operation, and continual service improvement. Some key processes explained in ITIL include change management, problem management, and incident management. The benefits of adopting ITSM best practices like ITIL are also highlighted.
The material discusses Quest's "future-ready" approach to IAM in the perspective of covering the EU GDPR compliance. We discuss about the five foundational concepts of the One Identity family of solutions, and our advantage and approach on covering the four IAM pillars.
With regards to the present audience, we also included an overview of the One Identity platform.
The presentation was developed for the RISK 2018 Conference in Lasko, Slovenia
This document provides an overview of security best practices when using AWS. It discusses AWS' shared security responsibility model and outlines key AWS security features such as IAM, encryption, firewalls, and monitoring tools. Recommendations are given for building secure infrastructure on AWS including account management, network segmentation, asset management, and monitoring. Case studies and additional resources are also referenced.
The document discusses database security. It notes that a DBA (Database Administrator) is responsible for database security, including access control, account creation, support services, privilege granting/revocation, backup/recovery, and ensuring data integrity, security, and privacy. Major database security threats include excessive privileges, privilege abuse, input injection, malware, weak audit trails, exposed storage media, exploitation of vulnerable databases, unmanaged sensitive data, and limited security expertise. Database security aims to ensure confidentiality, integrity, and availability of data through measures like access control, inference control, flow control, and data encryption.
Este documento describe la norma ISO/IEC 20000 y cómo puede mejorar la gestión de servicios TI de una organización. La norma establece requisitos para un sistema de gestión de servicios TI efectivo e integrado. Cubre áreas como planificación, implementación, prestación y mejora continua de servicios, así como procesos de gestión de relaciones, resolución de problemas e incidencias, control de cambios y entrega. Siguiendo los lineamientos de esta norma, las organizaciones pueden gestionar sus servicios TI de forma más estratégica y aline
Information Security Principles - Access Controlidingolay
The document discusses various concepts related to access controls and authentication methods in information security. It covers identification, authentication, authorization, accountability and different authentication factors like something you know, something you have, something you are. It also discusses access control models, biometrics, passwords and single sign-on systems.
The document discusses key concepts in IT service management (ITSM) and ITIL. It covers the core ITSM components including service strategy, service design, service transition, service operation, and continual service improvement. Some key processes explained in ITIL include change management, problem management, and incident management. The benefits of adopting ITSM best practices like ITIL are also highlighted.
The material discusses Quest's "future-ready" approach to IAM in the perspective of covering the EU GDPR compliance. We discuss about the five foundational concepts of the One Identity family of solutions, and our advantage and approach on covering the four IAM pillars.
With regards to the present audience, we also included an overview of the One Identity platform.
The presentation was developed for the RISK 2018 Conference in Lasko, Slovenia
The document discusses physical security considerations for protecting enterprise resources and information. It covers threats, site design including perimeter security, facility security requirements, fire protection measures, access controls, and considerations for both centralized and distributed computing environments. The goal is to implement layered physical and technical security controls to deter, detect, and delay unauthorized access to protected assets.
This document provides an overview of data loss prevention (DLP) technology. It discusses what DLP is, different DLP models for data in use, in motion, and at rest. It also covers typical DLP system architecture, approaches for data classification and identification, and some technical challenges. The document references DLP product websites and summarizes two research papers on using machine learning for automatic text classification to identify sensitive data for DLP systems.
This document discusses several security services: authentication, which verifies the identity of communication parties; access control, which limits access to systems and applications; data confidentiality, which protects transmitted data from unauthorized access; data integrity, which prevents unauthorized data modification; and nonrepudiation, which prevents senders or receivers from denying transmitted messages. These services provide specific types of protection for system resources and are implemented through security mechanisms to enforce security policies.
This chapter discusses physical and environmental security. It defines physical security and how it relates to information security. It emphasizes using layered defenses and controlling physical access. Specific recommendations include securing the facility perimeter, classifying workspaces, controlling access to sensitive areas, protecting equipment from threats, implementing fire prevention, and securely disposing of equipment.
Identity and access management (IAM) is a framework that facilitates the management of electronic identities and user access to systems. IAM systems use technologies like single sign-on, multifactor authentication, and privileged access management to securely store identity data and control user access. IAM allows organizations to automate the process of provisioning, managing, and revoking access to ensure appropriate access levels and compliance.
This document provides an overview and agenda for a presentation on ISO 27001 and information security management systems (ISMS). It introduces key terms like information security, the CIA triad of confidentiality, integrity and availability. It describes the components of an ISMS like policy, procedures, risk assessment and controls. It explains that ISO 27001 specifies requirements for establishing, implementing and maintaining an ISMS. The standard is popular because it can be used by all organizations to improve security, comply with regulations and build trust. Implementing an ISMS also increases awareness, reduces risks and justifies security spending.
Data Loss Prevention (DLP) - Fundamental Concept - ErykEryk Budi Pratama
This document discusses data loss prevention (DLP) concepts and implementations. It begins with an overview of data governance and the data lifecycle. It then defines DLP, explaining how DLP solutions protect data in motion, at rest, and in use. Sample DLP deployments are shown, outlining key activities and considerations for implementation such as governance, infrastructure, and a phased approach. Finally, examples of DLP use cases are provided for data in motion like email and data in use on workstations.
Identity and Access Management (IAM) is a crucial part of living in a connected world. It involves managing multiple identities of an individual or entity, distributed across disparate portals. In an enterprise, IAM solutions serve as a mean to secure access, control user activities and manage authentication for an App or a group of software (infrastructure).
This detailed PowerPoint brings you the most fundamental concepts and ideas related to identity and access management. Plus, we have debunked some popular IAM myths, so do checkout!
The document provides an overview of an Information Security Management System (ISMS) presented by Arhnel Klyde S. Terroza. It discusses what an ISMS is, common information security standards and regulations, an overview of ISO/IEC 27001, the controls specified in ISO/IEC 27001, and the benefits of adopting ISO 27001. Specifically, it defines an ISMS, lists some key information security standards and laws, describes the requirements and certification process for ISO/IEC 27001, outlines the mandatory clauses and control categories specified in ISO/IEC 27001, and notes that ISO 27001 provides a framework for complying with information security regulations.
The document provides an overview of GDPR and information security issues. It highlights key topics such as appropriate security, data protection by design and by default, security of processing, personal data breaches, and the differences between DPO and CISO roles. The document contains recommendations for technical and organizational security measures organizations should implement to comply with GDPR principles and ensure an appropriate level of data security. These include implementing privacy by design principles, conducting risk assessments, access management, encryption, backups, and incident response processes.
Many organizations and managed security providers are starting to move from SIEM, Security Information and Event Management, to EDR, Endpoint Detection and Response. The problem is this may not be the best decision for your organization. These technologies are similar but fundamentally different. This presentation also shares innovating ways to use your SIEM to catch the bad guys as well as learn some simple tricks for easing the burden of SIEM management.
This document provides an overview of an upcoming ISO27001 training course on Information Security Management Systems (ISMS). It discusses the objectives of the course, which are to learn about ISO 27001 requirements for ISMS, understand the significance of information security, and acquire awareness of underlying risks. The document outlines the key topics that will be covered, including information security background, ISMS benefits, requirements and risks. It also provides details on the recent updates to ISO 27001 in 2022, such as additional requirements for objectives, planning, operations and the introduction of new controls.
Data Protection Indonesia: Basic Regulation and Technical Aspects_ErykEryk Budi Pratama
The document provides an overview of personal data protection regulations and technical aspects related to data privacy. It discusses key aspects of the draft Indonesian Personal Data Protection Bill, including rights of data owners and obligations of data controllers. It also covers technical topics like identity and access management, data loss prevention, and incident management. The presentation aims to provide a basic understanding of both regulatory requirements and technical controls for protecting personal data.
Protecting Intellectual Property and Data Loss Prevention (DLP)Arpin Consulting
Protecting Intellectual Property and Data Loss Prevention (DLP) – what makes your business unique, different, valuable, and attracts clients and customers - presented at the Boston Business Alliance 9/23/09
This document discusses piggybacking and tailgating as security risks. Piggybacking refers to when an unauthorized person gains entry by following an authorized person, while tailgating implies the unauthorized person follows without consent. The document outlines various methods used for piggybacking, like surreptitiously following others or blending into large crowds. Tailgating is a security and compliance issue that can result in costs from theft, data breaches, and loss of productivity. The document recommends both physical security measures and social engineering or policy solutions to address tailgating risks.
The document provides an overview of access control systems and methodology. It covers topics such as types of access control including mandatory access control (MAC) and discretionary access control (DAC), authentication methods, implementation of access control through hardware, software and policies, and how access control protects systems from threats and prepares for minimal impact. It also discusses access control standards like the Orange Book and limitations of formal access control models.
Your adversaries continue to attack and get into companies. You can no longer rely solely on alerts from point solutions to secure your network. To identify and mitigate these advanced threats, analysts must become proactive in identifying not just indicators, but attack patterns and behavior. In this workshop we will walk through a hands-on exercise with a real world attack scenario. The workshop will illustrate how advanced correlations from multiple data sources and machine learning can enhance security analysts capability to detect and quickly mitigate advanced attacks.
Container Security Using Microsoft DefenderRahul Khengare
Microsoft Defender for Containers provides security for container workloads running on Kubernetes. It monitors clusters for misconfigurations and vulnerabilities, provides runtime threat detection, and generates alerts. It works across multiple clouds by deploying agents and daemons to collect security signals from the API server, nodes, and images. A demonstration showed Microsoft Defender in action monitoring container workloads.
As a follow-up on the previous session (4th of December), we run through the GDPR part of the ISO/IEC 27701 standard which has been published in August 2019.
We'll take it from another angle and use the ISO/IEC 27701 as a guide to complete the checklist for the GDPR implementation.
Also, with the help of the (new) PECB ISO/IEC 27701 lead auditor course, we'll have an auditor's look at the ISO certification and compliance. It's important to see how it works, to make sure your GDPR implementation can withstand the increasing demand for maturity from customers, subjects and data protection authorities that start to exercise their rights.
The ISO27701 contains important requirements and implementation guidance for implementing a PIMS (Privacy Information Management System), which will set the baseline for the future of privacy and data protection.
The webinar covers:
- The GDRP view of the ISO/IEC 27701
- Mapping the GDPR to-do and the ISO/IEC 27701 to-do list.
- The ISO/IEC 27701 auditor mindset
- Compliance AND/OR/XOR solid data protection?
- Status of GDPR certification
Date: December 04, 2019
Recorded Webinar: https://www.youtube.com/watch?v=P80So3ryvJ8&feature=youtu.be
The document discusses identity and access management (IAM). It outlines common IAM problems like weak passwords, password sharing, and lack of single sign-on. The presentation then discusses how IAM solutions can provide benefits like improved user experience through single sign-on, enhanced integration across systems, centralized administration to reduce costs, and increased security. Critical success factors for IAM projects include identifying business champions, thorough vendor analysis, defining requirements, understanding product features, and ensuring business support.
Applicant Tracking System Vendor Criteria ChecklistMatt Charney
Here's an easy to use spreadsheet for helping recruiting and staffing professionals as well as HR leaders with selecting which applicant tracking system (ATS) to use while considering new HR Technology. Use this sample vendor evaluation matrix during your own RFP processes for a side-by-side comparison of the recruiting software vendors currently under consideration.
• Make Versus Buy
• Benefit of Outsourcing
• Source of Supplier Information
• Strategis Selection
• Supplier Relationship Management (SRM)
• Industry Example
The document discusses physical security considerations for protecting enterprise resources and information. It covers threats, site design including perimeter security, facility security requirements, fire protection measures, access controls, and considerations for both centralized and distributed computing environments. The goal is to implement layered physical and technical security controls to deter, detect, and delay unauthorized access to protected assets.
This document provides an overview of data loss prevention (DLP) technology. It discusses what DLP is, different DLP models for data in use, in motion, and at rest. It also covers typical DLP system architecture, approaches for data classification and identification, and some technical challenges. The document references DLP product websites and summarizes two research papers on using machine learning for automatic text classification to identify sensitive data for DLP systems.
This document discusses several security services: authentication, which verifies the identity of communication parties; access control, which limits access to systems and applications; data confidentiality, which protects transmitted data from unauthorized access; data integrity, which prevents unauthorized data modification; and nonrepudiation, which prevents senders or receivers from denying transmitted messages. These services provide specific types of protection for system resources and are implemented through security mechanisms to enforce security policies.
This chapter discusses physical and environmental security. It defines physical security and how it relates to information security. It emphasizes using layered defenses and controlling physical access. Specific recommendations include securing the facility perimeter, classifying workspaces, controlling access to sensitive areas, protecting equipment from threats, implementing fire prevention, and securely disposing of equipment.
Identity and access management (IAM) is a framework that facilitates the management of electronic identities and user access to systems. IAM systems use technologies like single sign-on, multifactor authentication, and privileged access management to securely store identity data and control user access. IAM allows organizations to automate the process of provisioning, managing, and revoking access to ensure appropriate access levels and compliance.
This document provides an overview and agenda for a presentation on ISO 27001 and information security management systems (ISMS). It introduces key terms like information security, the CIA triad of confidentiality, integrity and availability. It describes the components of an ISMS like policy, procedures, risk assessment and controls. It explains that ISO 27001 specifies requirements for establishing, implementing and maintaining an ISMS. The standard is popular because it can be used by all organizations to improve security, comply with regulations and build trust. Implementing an ISMS also increases awareness, reduces risks and justifies security spending.
Data Loss Prevention (DLP) - Fundamental Concept - ErykEryk Budi Pratama
This document discusses data loss prevention (DLP) concepts and implementations. It begins with an overview of data governance and the data lifecycle. It then defines DLP, explaining how DLP solutions protect data in motion, at rest, and in use. Sample DLP deployments are shown, outlining key activities and considerations for implementation such as governance, infrastructure, and a phased approach. Finally, examples of DLP use cases are provided for data in motion like email and data in use on workstations.
Identity and Access Management (IAM) is a crucial part of living in a connected world. It involves managing multiple identities of an individual or entity, distributed across disparate portals. In an enterprise, IAM solutions serve as a mean to secure access, control user activities and manage authentication for an App or a group of software (infrastructure).
This detailed PowerPoint brings you the most fundamental concepts and ideas related to identity and access management. Plus, we have debunked some popular IAM myths, so do checkout!
The document provides an overview of an Information Security Management System (ISMS) presented by Arhnel Klyde S. Terroza. It discusses what an ISMS is, common information security standards and regulations, an overview of ISO/IEC 27001, the controls specified in ISO/IEC 27001, and the benefits of adopting ISO 27001. Specifically, it defines an ISMS, lists some key information security standards and laws, describes the requirements and certification process for ISO/IEC 27001, outlines the mandatory clauses and control categories specified in ISO/IEC 27001, and notes that ISO 27001 provides a framework for complying with information security regulations.
The document provides an overview of GDPR and information security issues. It highlights key topics such as appropriate security, data protection by design and by default, security of processing, personal data breaches, and the differences between DPO and CISO roles. The document contains recommendations for technical and organizational security measures organizations should implement to comply with GDPR principles and ensure an appropriate level of data security. These include implementing privacy by design principles, conducting risk assessments, access management, encryption, backups, and incident response processes.
Many organizations and managed security providers are starting to move from SIEM, Security Information and Event Management, to EDR, Endpoint Detection and Response. The problem is this may not be the best decision for your organization. These technologies are similar but fundamentally different. This presentation also shares innovating ways to use your SIEM to catch the bad guys as well as learn some simple tricks for easing the burden of SIEM management.
This document provides an overview of an upcoming ISO27001 training course on Information Security Management Systems (ISMS). It discusses the objectives of the course, which are to learn about ISO 27001 requirements for ISMS, understand the significance of information security, and acquire awareness of underlying risks. The document outlines the key topics that will be covered, including information security background, ISMS benefits, requirements and risks. It also provides details on the recent updates to ISO 27001 in 2022, such as additional requirements for objectives, planning, operations and the introduction of new controls.
Data Protection Indonesia: Basic Regulation and Technical Aspects_ErykEryk Budi Pratama
The document provides an overview of personal data protection regulations and technical aspects related to data privacy. It discusses key aspects of the draft Indonesian Personal Data Protection Bill, including rights of data owners and obligations of data controllers. It also covers technical topics like identity and access management, data loss prevention, and incident management. The presentation aims to provide a basic understanding of both regulatory requirements and technical controls for protecting personal data.
Protecting Intellectual Property and Data Loss Prevention (DLP)Arpin Consulting
Protecting Intellectual Property and Data Loss Prevention (DLP) – what makes your business unique, different, valuable, and attracts clients and customers - presented at the Boston Business Alliance 9/23/09
This document discusses piggybacking and tailgating as security risks. Piggybacking refers to when an unauthorized person gains entry by following an authorized person, while tailgating implies the unauthorized person follows without consent. The document outlines various methods used for piggybacking, like surreptitiously following others or blending into large crowds. Tailgating is a security and compliance issue that can result in costs from theft, data breaches, and loss of productivity. The document recommends both physical security measures and social engineering or policy solutions to address tailgating risks.
The document provides an overview of access control systems and methodology. It covers topics such as types of access control including mandatory access control (MAC) and discretionary access control (DAC), authentication methods, implementation of access control through hardware, software and policies, and how access control protects systems from threats and prepares for minimal impact. It also discusses access control standards like the Orange Book and limitations of formal access control models.
Your adversaries continue to attack and get into companies. You can no longer rely solely on alerts from point solutions to secure your network. To identify and mitigate these advanced threats, analysts must become proactive in identifying not just indicators, but attack patterns and behavior. In this workshop we will walk through a hands-on exercise with a real world attack scenario. The workshop will illustrate how advanced correlations from multiple data sources and machine learning can enhance security analysts capability to detect and quickly mitigate advanced attacks.
Container Security Using Microsoft DefenderRahul Khengare
Microsoft Defender for Containers provides security for container workloads running on Kubernetes. It monitors clusters for misconfigurations and vulnerabilities, provides runtime threat detection, and generates alerts. It works across multiple clouds by deploying agents and daemons to collect security signals from the API server, nodes, and images. A demonstration showed Microsoft Defender in action monitoring container workloads.
As a follow-up on the previous session (4th of December), we run through the GDPR part of the ISO/IEC 27701 standard which has been published in August 2019.
We'll take it from another angle and use the ISO/IEC 27701 as a guide to complete the checklist for the GDPR implementation.
Also, with the help of the (new) PECB ISO/IEC 27701 lead auditor course, we'll have an auditor's look at the ISO certification and compliance. It's important to see how it works, to make sure your GDPR implementation can withstand the increasing demand for maturity from customers, subjects and data protection authorities that start to exercise their rights.
The ISO27701 contains important requirements and implementation guidance for implementing a PIMS (Privacy Information Management System), which will set the baseline for the future of privacy and data protection.
The webinar covers:
- The GDRP view of the ISO/IEC 27701
- Mapping the GDPR to-do and the ISO/IEC 27701 to-do list.
- The ISO/IEC 27701 auditor mindset
- Compliance AND/OR/XOR solid data protection?
- Status of GDPR certification
Date: December 04, 2019
Recorded Webinar: https://www.youtube.com/watch?v=P80So3ryvJ8&feature=youtu.be
The document discusses identity and access management (IAM). It outlines common IAM problems like weak passwords, password sharing, and lack of single sign-on. The presentation then discusses how IAM solutions can provide benefits like improved user experience through single sign-on, enhanced integration across systems, centralized administration to reduce costs, and increased security. Critical success factors for IAM projects include identifying business champions, thorough vendor analysis, defining requirements, understanding product features, and ensuring business support.
Applicant Tracking System Vendor Criteria ChecklistMatt Charney
Here's an easy to use spreadsheet for helping recruiting and staffing professionals as well as HR leaders with selecting which applicant tracking system (ATS) to use while considering new HR Technology. Use this sample vendor evaluation matrix during your own RFP processes for a side-by-side comparison of the recruiting software vendors currently under consideration.
• Make Versus Buy
• Benefit of Outsourcing
• Source of Supplier Information
• Strategis Selection
• Supplier Relationship Management (SRM)
• Industry Example
The document discusses selecting an enterprise collaboration platform. It provides an overview of key considerations such as defining specific use cases, gathering requirements, evaluating integration needs, and conducting vendor demonstrations and RFPs. Microsoft SharePoint is identified as the market leader due to its comprehensive features and wide adoption, though careful planning is needed for complex implementations. OpenText and EMC also offer robust platforms but are better suited for more specialized use cases.
Agile Technologies provides consulting services to help clients select and implement new insurance applications. Their standard approach involves defining requirements, reviewing vendors, selecting a vendor, and providing implementation oversight. Agile has deep insurance industry expertise and experience helping clients select and implement policy administration, claims, and business intelligence systems.
Focus On: Applicant Tracking Systems (Webinar)Shorebird RPO
In this webinar Richard Wilson, MD of Shorebird, shares his knowledge of recruitment software and focuses on Applicant Tracking Systems
Richard covers;
What is an Applicant Tracking System and who needs one
What an Applicant Tracking System should do for an employer
What an Applicant Tracking System should do for an applicant
Key tips for implementation
Richard also discusses; the candidate experience, your recruitment career sites and things to look out for when integrating your recruitment tech.
You can watch the full recording of this event by clicking play at the end of this slideshow
For an online demonstration of the Shorebird Manage ATS please email marketing@shorebird-rpo.com
This document provides checklists for recruiting and onboarding new employees. The recruiting checklist outlines steps including creating a job description, posting openings on job sites and social media, conducting phone interviews to evaluate fit, conducting in-person interviews to assess skills and experience, following up with candidates, conducting reference and social media checks, and making a contingent job offer. The onboarding checklist includes setting goals and benchmarks, providing equipment and tools for success, completing paperwork and training on the first day, determining an ongoing training process with testing, and scheduling weekly check-in meetings for feedback and coaching.
The document discusses a strategic approach to hiring that involves HR specialists conducting comprehensive interviews with managers to understand hiring needs, then developing a customized hiring package. This includes job descriptions, marketing strategies, and timelines. The HR specialists lead managers through strategic thinking about positions before launching a timely recruitment process. The goal is for HR to approach hiring like executive search firms by engaging clients, documenting requirements, setting expectations, adding value, and measuring success.
It’s no secret that one of the biggest expenses and assets for an organization are employees. From recruiting and hiring to training and retaining, managing human resources is a huge cost. If done well, it can also be the biggest asset.
According to a recent study (August 2012), the Boston Consulting Group found that out of all HR functions, recruiting has the highest impact on revenue growth and profit margins. In this session, we explore the hidden earning potential of recruiting.
Join Mike Mayeux, Founder and CEO of Novotus as he provides information that helps talent acquisition leaders share the impact of recruiting. As a leader in the recruiting industry, Mike uses nearly 20 years’ experience in the talent acquisition industry to steer employees, clients, and candidates toward success. With his unique understanding of technology, consulting, and recruiting, Mayeux leads the Novotus team to accomplish the goal of reinventing talent acquisition. Always on the cutting edge of interactive technology, Mayeux allows Novotus to lead the industry in tools and best practices that improve clients recruiting results.
In this webinar, you will learn:
1) Methods of establishing quantitative results to show the business impact of recruiting.
2) Examples of the potential cost savings associated with recruiting.
3) A method for calculating the true cost of turnover.
4) Metrics to link lost revenue associated with recruiting and speed of hire.
5) A method to measure the revenue impact associated with quality of hire
Recruitment Process Audit - Sample audit reportVijay Anand L V
Recruitment Process Audit helps the organization to identify the gaps, issues and flaws in the recruitment system. Best suits for the Recruitment companies who would like to generate revenues for their organization.
- The document discusses how to create an agile contract between a customer and supplier using an agile approach. It emphasizes establishing trust and aligning incentives between both parties.
- An "optional scope contract" is recommended, which has fixed time, cost, and quality, but variable scope. It allows for incremental delivery and regular payment. Either party can terminate early.
- The contract should specify obligations of both customer and supplier to collaborate through activities like sprint planning and reviews. It also allows the customer to change features freely and terminate the project after any sprint if no longer valuable, paying a small cancellation fee.
- Transparency is key to building trust over time through the agile process.
The document discusses implementing an applicant tracking system (ATS) and provides a strategic 3-step approach: 1) Analyze the current hiring process by interviewing stakeholders to understand workflows and gaps. 2) Define the future state and compare it to identify gaps. 3) Create an action plan to address findings and prepare for implementation. It emphasizes analyzing both the current and desired future processes to ensure the ATS can meet future needs and avoid costly workarounds. Conducting this analysis upfront can prevent risks associated with retrofitting processes to new technology.
The document discusses the process of shortlisting candidates during the recruitment and selection process. Shortlisting involves identifying a manageable number of candidates who are best suited for a position based on pre-determined criteria. The key steps are to apply fair selection criteria aligned with job requirements, conduct a thorough evaluation of candidates using tools like scoring matrices, ensure documentation of the process and outcomes, and notify unsuccessful candidates in a timely manner through letters of regret. Shortlisting aims to reduce a large applicant pool to a shortlist of qualified candidates who can then progress to the interview stage of selection.
The document is a competency assessment matrix that outlines 36 competencies across categories like leadership, interpersonal skills, analytical abilities, dynamism, business awareness, and operational skills. It will assess candidates using methods like personality questionnaires, ability tests, presentations, case studies/interviews, role plays, and written exercises. The competencies are defined in the matrix to provide guidance on what will be evaluated for each competency.
Drafting a partner strategy for a software vendor régis collignon alliance ...regiscollignon
This document outlines a layered approach to developing a partner strategy for a software vendor. It discusses developing the strategy at the strategic, tactical, and operational levels. At the strategic level, the goals and vision for partnerships over 3-5 years should be defined. Tactically, required resources like a partner manager and sales/services engagement models are determined. Operationally, specific partners are identified and evaluated, partnership agreements are signed, and joint marketing, sales, and support plans are established. The key is preparing thoroughly at each level and gaining internal buy-in before implementing an effective partner program.
This document contains an assessment checklist used to evaluate assignments at several educational institutions in Malaysia. The checklist contains 13 criteria used to assess assignments, including whether learning outcomes, assessment criteria, and program outcomes are clear to students. Assignments are also evaluated based on appropriate task complexity, relevance to the program, realistic deadlines, and freedom from bias. The checklist is signed by an assessor and internal verifier upon review, and includes space for comments on specific assignment questions or tasks. A second section of the checklist is used specifically for English language assignments and focuses on grammatical accuracy.
This document contains a list of potential questions that could be asked during a job interview conversation in English as a second language classroom. There are over 30 questions provided ranging from questions about the applicant's background and qualifications to questions about their management style, reasons for leaving previous roles, long term goals, and opinions on industry trends. The questions are intended to help non-native English speakers practice common discussions around employment opportunities.
An applicant tracking system (ATS) is a software application that enables organizations to manage recruitment electronically. It allows storing of candidate resumes in a database to facilitate effective searching, filtering, and routing of applications. ATS also aims to improve productivity in recruiting processes by automating tasks like sourcing, screening, interviewing, and hiring. Using an ATS provides benefits such as quicker hiring decisions, reduced costs and time per hire, and ensuring equal employment opportunity compliance.
This document discusses best practices for software vendor selection. It begins by introducing Advantiv Solutions, which provides tools to help with complex procurement projects. The document then outlines lessons learned from past vendor selection projects, emphasizing that they should be business-driven projects with clear requirements and stakeholder involvement. It also discusses the vendor perspective and common mistakes made during selections. The document concludes by highlighting emerging practices like increased due diligence and stakeholder education, as well as advice from industry peers.
Vendor Management - Compliance Checklist Manifesto SeriesContinuity Control
Regulatory examiners are expecting to see and review your financial institution's vendor management program, which is to include a process for assessing specific vendor risk, vendor selection, contracting, and ongoing oversight. This webinar will demonstrate that implementing a repeatable process will provide consistency and reduce your institution's Compliance Tax by saving you time and resources, including helping to ensure your valuable dollars are spent wisely.
Objectives:
- Understanding of the regulatory requirements for the vendor management program
- High level overview of the key elements
- Provide guidance in developing your program
Adecco Xpert offers clients additional testing and skill assessments as part of our superb recruitment service which is 2nd to none. For more information please feel free to contact me.
The document discusses candidate assessment solutions provided by Adecco Group to improve placement quality for both clients and applicants. It outlines the benefits of using online assessments to objectively determine skills, knowledge, aptitude, personality and motivation through standardized tests. These assessments evaluate candidates on factors like "Can Do", "Will Do", and "Will Fit" to better match them to open positions. The solution has seen worldwide adoption across Adecco Group's offices and industries.
Srividhya Sitaraman passed the Oracle Java Standard Edition 6 Programmer Certified Professional exam with a score of 91%, above the required passing score of 61%. The report indicates that she answered questions incorrectly in the objectives related to loops and iterators, exceptions, regular expressions, and the generic Collections API. It provides instructions on completing certification requirements, including ensuring her address is correct in her Pearson VUE profile to receive her certification materials.
Xybion Corporation - Best practice webinar series - What you need to know about ECM/EDM. In-depth presentation of key issues and trends in content, data and records management
AI and ML Series - Leveraging Generative AI and LLMs Using the UiPath Platfor...DianaGray10
📣 AI plays a crucial role in the UiPath Business Automation Platform. In this session you will learn about how the UiPath Business Automation Platform is well-suited for AI, the use of LLM and integrations you can use. Topics include the following:
Introductions.
AI powered automations overview.
Discover why the UiPath Business Automation Platform is well-suited for AI.
LLM + Automation framework and integrations with LangChain.
Generative AI Automation Patterns Demonstration.
👨🏽🤝👨🏻 Speakers:
Dhruv Patel, Senior Sales Solution Architect @UiPath
Russel Alfeche, Technology Leader, RPA @qBotica and UiPath MVP
Microsoft offers a wide range of certification exams that are designed to validate individuals' skills and knowledge in various Microsoft technologies. These exams assess proficiency in areas such as Azure cloud services, Microsoft 365, Windows Server, SQL Server, and programming languages. Passing Microsoft exams allows individuals to earn certifications that demonstrate their expertise and enhance career prospects in the technology industry. The exams are available at different levels including fundamentals, associate, and expert levels, and cover topics relevant to specific job roles and technologies. Popular exam examples include Azure Administrator Associate, Azure Developer Associate, and Microsoft 365 Certified: Modern Desktop Administrator Associate.
Field Recruitment Skills Testing Brochure- With over a 1000 tests on offer we can test your candidates or employees on everything from Microsoft Applications to job specific tests in areas such as Finance, Sales, Nursing, Engineering, Secretarial and many more.
The document summarizes the results of a Microsoft certification exam that was passed. It provides the overall score and performance on each section. It directs the user to resources for reviewing skills measured, and explains how to access certification program benefits and view official exam results online within 7 days.
Robin Pagaduan is an experienced QA tester and systems analyst with over 15 years of experience in testing various software applications and websites. They have extensive experience testing healthcare applications such as those for Blue Cross Blue Shield of Rhode Island including testing websites, salesforce, security applications, and data integration. They also have experience testing CVS.com, managing other testers, and ensuring projects meet deadlines and quality standards. Robin Pagaduan has a track record of successfully implementing test strategies and resolving issues to deliver projects on time.
This document discusses using generative AI and UiPath together for automating processes. It begins with an introduction to UiPath and generative AI powered automations. It then outlines three patterns for building generative AI powered automations using UiPath: reader/writer, analyst/doer, and assistant. Several example use cases are provided for each pattern. The document concludes with a discussion of upcoming Dev Dives webinars and a UiPath/Hyper Automation hackathon.
This document provides information about Service Cloud Q&A including the 9 steps of the Plan Phase, the purpose of the Consultant and Client team kickoffs, high-level success metrics for customer service, means for ensuring sustainability and increasing productivity of customer service, means for securing customer loyalty, important considerations when designing a solution, the purpose and basis of the SOW, who should be included when scoping custom functionality, key tasks of the Discovery Process, the main activity of the Analyze Phase, the 4 activities in the Analyze phase, an example Service Cloud feature that contributes to efficient routing, the main functions of Workforce Management software, the processes in the Design phase, ways to maximize the agent experience, examples of using case related
The document discusses Microsoft's governance framework and approach to ensuring compliance in Office 365. It outlines the key stakeholders involved in compliance governance and describes communications and change management strategies. It provides details on the built-in capabilities and customer controls in Office 365 that help customers meet various compliance standards and regulations. It also discusses Microsoft's continuous monitoring, auditing and certification efforts to ensure Office 365 remains compliant.
The document discusses Microsoft's governance framework and approach to ensuring compliance in Office 365. It outlines the key stakeholders involved in compliance governance and describes communications and change management strategies. It provides details on the built-in capabilities and customer controls in Office 365 that help customers meet various compliance standards and regulations. It also discusses Microsoft's continuous monitoring, auditing and certification efforts to ensure Office 365 remains compliant.
Quality Assurance & Testing in a glimpseTahmid Munaz
This presentation slide has been made in respect of our local market, demand, practice and scope for the beginners in Bangladesh.
There are many things which are need to be discussed widely, cause the points mentioned here are not covering all the stuff as it shown and in some places it depends on context and contradictory thoughts may arise unless you feel free to discuss. I just wanted to give a glimpse giving an Option to everyone to participate the presentation...
20110427 ARMA Houston Professional Development for the RIM PractitionerJesse Wilkins
This session at the ARMA Houston Spring Seminar described different avenues for records development including certifications, certificates, and informal learning opportunities.
This document outlines 10 steps to achieve Oracle certification success: 1) Visit the Oracle Certification Program website, 2) Choose a certification path, 3) Select an application release, 4) Select a certification level, 5) Select a certification track, 6) Attend a hands-on course, 7) Prepare for exams, 8) Create a CertView account, 9) Register for exams, and 10) Take certification exams. It also provides habits of highly successful Oracle certified professionals and success profiles of individuals who earned Oracle certifications.
Presentation in ACL Connections in Atlanta - April 2013mcoello
This document outlines best practices for creating a sustainable analytics program, including operating as a centralized center of excellence, utilizing various analytic techniques, investing in documentation, obtaining data from multiple sources, building a toolbox of analytic capabilities, running a cost-efficient practice, standardizing scripts, leveraging external lists, promoting innovation, protecting data, forming strategic partnerships, and establishing a unique culture. It provides guidance on roles, processes, infrastructure, documentation, analytics techniques, data management, governance, and culture to transform the use of analytics.
The document provides an overview of developments in automated testing and computerized test evaluation systems. It discusses 10 key areas: 1) background and evolution of automated testing, 2) planning valid tests, 3) developing tests, 4) various item formats, 5) administering tests, 6) scoring and reporting, 7) psychometric analysis, 8) communications, 9) security concerns, and 10) ensuring accessibility. The final comments note continuing evolution in areas like bandwidth, delivery methods, item formats, administration features, and adherence to proper development processes.
Marc Hamel from Amazon as he shares methods for "Sourcing by Source Code."
Marc will teach you how to navigate open-source platforms to find the talented minds behind the code. This is a start-to-finish process of how to find, engage, and message talent on GitHub, an open-source platform with over 73 million active users.
Our very own Obi-Wan Kenobi and Jedi Master Brian Fink is here to take us through 60 minutes of LIVE training on how to develop kick-ass habits that will boost your tech recruiting efficiency.
These takeaways will benefit you no matter what position you hold: recruiter, sourcer, hiring manager, train conductor - you need to be here.
DE&I Strategy: Transparency is Always Key
In this session, Keirsten Greggs, Founder at TRAP Recruiter, guides us through how to effectively, honestly, and openly talk to your candidates about your organization's DE&I strategy.
She'll also dive into your role as a recruiter - you are pivotal in the design and implementation of your company's efforts.
People want to see action. Not just promises.
Candidates are demanding understanding, knowledgeable insight, and to believe that the company they are considering is proactively improving their DE&I strategy for the long-haul.
Answering your candidate's questions mindfully and with proof-positive data (talk the talk & walk the walk) is integral to aligning values and building relationships.
During this session, Keirsten covers:
Transparency: the key to establishing trust
Relationship Building: underrepresented, historically excluded talent communities
Accountability: using data to support your strategy
Proactive Approach: Recruiters/TA involved in developing strategy (not just given to them)
If you're struggling with your candidate outreach engagement metrics, it's time to look at your email deliverability.
Or, maybe your emails are going to SPAM.
If you're changing to a new email service provider, starting a new candidate outreach strategy, or if you'd just like to hear about some killer tips and tricks from Shally...this webinar is for you.
We'll go over what you need to know in 2022 for maximum email deliverability.
Delivery, engagement and bounce rates
SPAM...wonderful SPAM
SPF and DKIM (what did you just call me?)
Your sender reputation
Common issues
New things to consider in 2022
Let's Findem
If you're having trouble attracting world-class, hard-to-find, must-have talent to grow your company, you're not alone.
Pretty much every company is struggling right now to build a high-quality and diverse talent pipeline.
If your recruiters spend more time rejecting talent than closing candidates, then you need a better way.
So how do you find the talent you’re missing and no one else is sourcing?
Findem helps companies like RingCentral, Google, and Booster find and hire talent in a whole new way.
Watch Findem CEO and Co-founder Hari Kolam in this recorded demo, and learn how Findem transforms workforce planning, sourcing, engagement and recruitment analytics with people intelligence and automation.
YOU’LL LEARN HOW TO:
Search for talent no one else can find
Increase diversity in your talent pipeline by 5x
Boost recruiter productivity from search to hire by 9x
The typical recruiter spends almost a third of their workweek sourcing candidates. Take a quick hour to check out an awesome tool that could honestly help save you time and money.
Shally Steckerl walks you through Google CSE new features. Google's Custom Search Engines are a great way to focus and limit your searches to just the relevant databases.
A Google Custom Search can x-ray Linkedin, filtering the results based on the primary geographies where you are focusing your search.
Add “refinements” to build collections of websites and add extra keywords to your search automatically.
Create custom-saved search shortcuts that prompt for keywords, so you don’t have to memorize Boolean and other syntax.
Be more productive with the Favorites and other toolbars.
Have fresh search engine results emailed to you daily or weekly.
Capture all your custom search engine results with one click directly into a spreadsheet you can import with any CRM.
Laura Mazzullo walks us through best recruitment practices in the Covid era.
- Guiding hiring managers and candidates to clarity using emotional intelligence and data.
- Helping candidates ‘stay in their own lane,’ work through their fears
- Acceptance vs. Resistance: Make room for big feelings, it’s your job now
- Questions to make everyone think differently
- The importance of “Hell yes” vs “Hell no!” during a candidate’s job-search journey
Energy Shift
Past
Rewind to two months back. We didn’t “have time” to “think about” how our TA teams were structured or the TA tech we were using. Emphatically speaking, understanding our process or how it may be affected by one swift downturn was not something we were concerned with.
Present
Until now.
We are listening. We’ve heard the RecruitingDaily audience, loud and clear over the last few weeks.
Many companies that we’ve heard from (and there’s been plenty) are simply not equipped to handle a swift change to a once comfortable environment in Talent Acquisition.
The problem? TA Tech and Process.
Does our tech align with our strengths?
Will it exploit our weaknesses?
Is our process meaningful and does it create a wonderful candidate experience?
We are going to help you navigate these questions.
Specifically:
Understanding yourself and where you need to enhance your strengths and/or shore up your weaknesses
Interpret your team’s alignment, how they collaborate, how the workflow works or doesn’t with regards to your team
Outlining your processes, how they’re linked or not, how to effectively audit said processes, how to continually make workflow and quality the responsibility of everyone and of course…
Discovering how talent acquisition technology, from sourcing to programmatic ad buying to recruitment marketing to creating a wonderful candidate experience, works or doesn’t work.
Future
We’ll give actionable advice on all four fronts. You’ll leave the webinar inspired to invest in yourself, your TA team, your TA processes, and your TA technology.
Ronnie Bratcher will introduce alternative search engines besides Google and teach how to use their syntax and techniques. The webinar will experiment with natural language search on engines like eTools, Carrot2, Peekier, Millionshort, Metager, Gibiru and Mojeek. Attendees can ask questions and will receive a recording of the slides and webinar.
Don't Be a Hack (That's a punny) 11 Tricks Sourcers Need to Know For 2020RecruitingDaily.com LLC
Straight to the Source
Sarah Goldberg (She/Her), Sourcing Engagement Lead at Objective Paradigm, owns the master-list of sourcing hacks. 2020 has thrown us some curveballs but we’ve learned a lot, and we’re still sourcing! Sarah has agreed to share what you need to fill your toolbox for the rest of the year.
This means live training, take-home materials, and open Q&A.
(Please enjoy this hilarious but totally unrelated GIF)gif-hacker
The Plan
Simple. Sarah is going to show you things you actually need to know when sourcing. No BS.
What this is:
Essential
Useful
Time-Saving tricks that will make your life and your job easier and more fun. Plaintext.
What this isn’t:
Fluff
Clutter
Pointless, waste-of-space tools and extensions that make you question what it is you’re really doing with your life and toss your laptop through the window.
Yeah. Don’t do that, okay?
Take a deep breath.
Here’s a taste of the takeaways:
Remote work survival kits
How to look for people, not candidates
X-ray searches & how URLs actually work
How does data scraping add value, and how do you actually do it?
Build your own boolean library with a free spreadsheet.
Editing tools (yes, you need these)
How do you validate your outreach?
Chrome extensions (plus when to use each one and when not to)
Useful templates for…ha. You have to join to find out.
Keyboard shortcuts
Last but not least, the one free tool Sarah cannot source without.
Materials Required
Your brain
A pat on the back for committing to an incredibly valuable learning session that will fill your toolbox with tried and true sourcing hacks, tips, and tricks.
We’ll do the rest.
I'm Gonna Make You Love Me. What Motown Knew About Working with Hiring ManagersRecruitingDaily.com LLC
The Sweet Art of Persuasion
6 Authoritative Hits for Recruiters
Motown really knows relationships, so of course it stands to reason that Motown is hiding the holy grail of influencing hiring between its funky lines (i.e., they know how to work with hiring managers).
"Why does that stand to reason?" you ask? I dunno. I don't have time to explain it to you.
We asked Steve O'Brien - an especially groovy dude who just so happens to be President of Staffing at Job.com - to go on a mission through Motown. What he found was pretty far out, and that (you guessed it) is why we're here.
Motown’s 6 Principles of Persuasion
You want to work on requisitions that are actually approved? More hires? Feedback!? Here's the thing: You gotta rule The Man...or The Man rules you.
We're going to take a deep look at your relationships with your hiring managers and what it takes to be an advisor instead of a paper-pushing, interview scheduling, support role.
Here's what you're going to learn.
Track List
Reciprocity, Reach Out (I'll Be There), Four Tops
Scarcity, Needle in a Haystack, The Velvelettes
Authority, Super Freak, Rick James
Consistency, Keep on Truckin', Eddie Kendricks
Liking, What Does it Take (To Win Your Love), Junior Walker and the Allstars
Consensus, Let's Get it On, Marvin Gaye
BONUS B-SIDE: Lean on Me, Bill Withers
Hey - We're all sensitive people...
...with so much to give. Just think of how sweet and wonderful life can be if you take the lead with your manager.
We don't want to push, but...see you on the webinar.
3 Best Practices for Each Stage of the Recruiting Workflow: Sourcing, Messagi...RecruitingDaily.com LLC
Recruiters are really bad at marketing.
Yeah, I said it. And I’ll say it again.
Here’s the deal.
I (Ryan Leary) will be hosting this webinar along with my pal Mike “Batman” Cohen to help bring marketing back to recruiting.
Wait, it left?
That depends on who you are talking to.
Some might say, “It was never a thing.”
Recruiters are Marketers. Ryan Leary RecruitingDaily
So… Here’s what we are going to do
We communicate for a living, but when it comes to communicating with prospects and candidates, we often fail.
Strike that. We FAIL at communicating and connecting.
Using a combination of personal experience, recruitment community education, and scientific research – let’s talk about 3 best practices for each stage of the recruiting process (top and middle of the funnel).
Sourcing.
Messaging.
Qualifying.
What are the industry-agnostic best practices during each stage? And why? Who says?
The Takeaways:
3 Sourcing
3 Messaging
Qualification Call
Best Practices with data and market research validation and (of course) abdominal exercise (from laughing – Batman’s pretty funny).
How to hire 1,000 Software Engineers & Does the Market Actually Hate YouRecruitingDaily.com LLC
Be Great.
A company is only as exceptional as the people in it, and to get exceptional people, a strong recruitment process is a must.
Whether you’re building a recruitment process for the first time or want to optimize a current one, Brian Fink, Senior Talent Sourcer at RentPath, will provide guidelines and resources that will put your process ahead of the pack.
Like WAY Ahead of the Pack.
Yeah, we know we’re funny sometimes, but this is no joke. Brian’s a total VIP across the sourcing & recruiting world (i.e., you want to listen to him). Check him out as the Master of Ceremonies at HRTX Recruiting & Sourcing Educational Workshop.
What You’ll Learn
From understanding your needs to providing a positive candidate experience, you (with a little help from Brian, of course) will create a comprehensive and actionable recruitment process that will nurture candidates and eliminate bottlenecks!
At a glance we will focus on:
Knowing your must-haves from your nice-to-haves
Understanding what success will look like in the role
Attracting active and passive talent
Nurturing candidates until the timing is right
And if you can’t attend the live session…
No worries. We’ll send you a copy of the recording and materials just for registering so you can learn on your own time.
It’s Over.
It Came. It Went.
Now, we DEMO.
Hours spent sourcing with the same half-baked strategies and tactics. The frustration. The head banging insanity feeling that you get trying to fill the same slate of candidates over and over with little success.
Is this how you want to source?
Nope. (at least I don’t)
We’ve put together what we consider to be the absolute best sourcing webinar in the history of sourcing webinars.
The 12 Days of Sourcing delivered 12 days of hard hitting tips and tricks in December. On this webinar we are going to wrap up the 12 Days of Sourcing, demo the tips, and talk sourcing with some of the best contributors we’ve had this year.
What to Expect:
We’ll be demoing and reviewing all 12 tips that we’ve shared
Brian and I (Ryan Leary) will be taking questions and answering live, classroom style.
Here’s what we are going to cover:
The single biggest networking or business development opportunity of this decade – Instagram DM.
Brian’s favorite search engines and WHY.
Ryan’s box of hacks. Hello, ingenuity.
Tools, chrome extensions, tricks.
The whole bag of gifts and more…
Out with the old.
Diversity recruiting does NOT start with sourcing women or gay or (insert minority here) candidates.
Instead, it starts with the company understanding their place in the world. Which minorities are the significant members of the company's local (and global) society? Moreover, which groups and sub-groups are considered a minority within the company?
Only after this acknowledgment will companies start targeting and attracting members of the various minority groups.
And In with The Balazs.
Balazs Paroczay is the Global Sourcing Strategist for Balazs.com and a world-wide diversity authority.
He's agreed to hand you 60 minutes of live training and Q&A targeted at moving you into the modern era of naturally diverse hiring. To sum up, he's going to show you how to Do Diversity Right.
The Balazs is on Facebook, Twitter, Instagram, and LinkedIn, and we highly recommend you hop on over and take a look. In other words, if you're not already following him, you're missing out - he's kind of a big deal.
What You Will Learn
We're going to cover some serious ground, including this:
The start and the actual hard work of D&I recruitment
Tons of real recruiting and sourcing best practices
Honest, down-to-Earth words from a D&I practitioner
And a whole lot more...
And hey, if you can't make the live webinar, we'll send you a copy of the slide deck and recording just for registering.
What do you say?
The State of College Recruiting: What The Emerging Workforce Really Wants.RecruitingDaily.com LLC
Who are YOU hiring?
A Deeper Look at Gen Z
For years, much of the talk about how to engage, recruit, and retain talent has centered around Millennials, also known as Gen Y.
This group is now the largest cohort in the workforce but no longer are they the youngest. The oldest members of Gen Z are currently entering the workforce. They’re full-force ahead with competencies, interests, and values of their own.
We know their demands and necessities differ from Gen Y & Gen X, even wildly so from Baby Boomers.
So, how do we distinguish between generational vs. age-based differences?
What strategies do leading employers use to better engage with these young adults (Gen Z), the oldest of whom are entering college – and your workplace.
Who’s Talking?
Steven Rothberg, Founder of College Recruiter, has made a living out of not only understanding what the emerging workforce needs and wants, but helping the youngest of our society enter the career field.
College Recruiting is kind of his thing. And we think that’s really cool.
He’s agreed to join us for 60 minutes of live training and Q&A, giving you the insider’s knowledge you need to win extremely valuable, in-demand talent.
The Answers
This is what you’re going to learn:
Generational Differences vs. Age Differences
Honing in on Gen Z attributes, goals, and tools: what they bring to the job and a look at the future.
Gen Z priorities in the workplace, ethics, marketing, and life in general
A heck of a lot more…
The Evolution
Means learning. Action. Movement. Understanding. Adaptation.
Join us here.
Film School for Recruiters: Video Content & Visual Storytelling Best Practices RecruitingDaily.com LLC
Time to pull out your thinking cap…
We want you to take a moment to picture your current job postings.
Does this sound familiar?
Long text document with 20 to 30 beneficial traits or skills you’d like in a candidate
A few paragraphs (for appearance’s sake)
Some bullet points
Required EEOC language
The word “ninja”
Now, imagine that same post scrolled in quill pen, gently floating away via carrier pigeon.
Sound a little outdated? You can do better than medieval, and we’re going to show you how.
This is Where Video Comes In
Elena Valentine, CEO & Co-Founder of Skill Scout, has dedicated her entire career to modernizing the Talent Acquisition through video content and visual storytelling.
Elena is an expert in leveraging video stories in the workplace. With the motto “you cannot be what you cannot see” Elena started filming jobs as a way to get young people excited about the world of work. Since then, her team at Skill Scout has built a world class media company. Their films have helped clients like Nike and American Airlines engage candidates and employees alike.
She was recently named “HR Superhero of the Year” by DisruptHR Chicago. She is also the co-founder of Mezcla Media Collective. A non-profit that elevates women filmmakers of color. Next up for Elena and her team is the Humans@Work documentary series that shares stories of people who find passion and meaning in their work.
Her daily mission is “Helping Teams Attract, Engage, and Retain Talent Through Workplace Media.”
Her mission for this webinar: To take to you through a step-by step-process that will create candidate engagement and help you snag your best talent (and also get rid of those boring old job posts).
What you’re going to learn:
How to use photos and video to take your job postings from “Bland to BAM”
How to improve your company’s image
Using video and photo to entice qualified candidates who want to work with you
More…
These are tools you have at your fingertips and can be utilized to promote you from Carrier Pigeon to Magnificent Job Posting Magician.
Convinced? Yeah, so are we, along with the entire TA industry.
Video is a must if you’re going to stay on top of your game. Elena will teach you how.
And no worries, if you can’t sit for the webinar, simply register – we’ll send you the video and slide deck so you can learn on your own time.
What do you say?
You Can’t Have One Without the Other
You know the story. Over the last few years, we have seen silos forming between sourcing and recruiting.
Each side feels they are the more important function.
Awkward Meme GIF by swerk
In reality, they should be working as a unit.
Yep – one happy little cohesive team dancing their way to the candidate fair.
We know a guy who can help…
Michael Goldberg, Founder and CEO of Hiring Transformed, has made a living out of understanding the sourcing-recruiting relationship and has agreed to give you 60 minutes of uninterrupted, live counseli…training.
Let’s call this training.
He’s known for his ability to build kick-ass Talent Acquisition teams and has been doing it for many, many years. If you don’t believe us (and you somehow don’t know who he is) check him out.
Here’s what you’re going to learn.
1. How to eliminate the blurred lines.
2. How Recruiters and Sourcers can work more effectively together.
3. What sourcing and recruiting managers, as well as Heads of Talent, can do to eliminate the riff.
4. What recruiters in smaller companies (with no sourcing functions) can do to build their sourcing skills.
What do you say?
All you need is an open screen and a box of tissues. We’ll handle the rest. You’ll go home with the tools to create a truly functional partnership with your “other half.”
How To Optimize Your Tech Recruiting Stack
Patrick Christell, Senior Sourcer at Hire4ce, meets all the qualifications of “MASTER.”
We’re talking a Full-Lifecycle Recruiter, Project Manager and Agile sourcing pod-builder with seven-plus years of progressive experience recruiting for technology companies across the boards.
He also has a rather impressive tech stack, which is what this is all about.
Patrick is here to give you 60-minutes of training and live Q&A that will help you learn to recruit top talent.
In this webinar we will cover:
- How to search.
Tools like Hiretual, Seekout, AmazingHiring (and their plusses and minuses).
The difference between searching for senior-level engineers, how to know if you are on a purple squirrel hunt, and what to with a BONUS live demo that iterates a single string.
- How to run a sourcing pod.
Learn how Patrick creates his own CRM that can do outreach and reporting
- How to understand tech without being a techie.
What a software stack even is, understanding how it fits together, learning what each part of the stack technologies are associated with.
- How to engage talent.
Why a mixture of broad spectrum outreach and personalized outreach is best.
What cadence works best in 2019.
Why only using inmails screws you, and how to leverage the phone even if you hate using it (TextNow).
Nobody’s got time for a floppy stack.
Let Patrick show you how to build in functionality and results.
11 steps you must take before purchasing talent acquisition technologyRecruitingDaily.com LLC
Buying TA technology can be complex and often daunting.
We feel ya.
For this special occasion, we're pulling out our "Short-List of Things That Annoy the Heck Out Of Us When Trying to Find TA Tech."
Long title, yes, but it fits.
Variety of tools.
Infinite categories of tools.
Burning bridges TA Leaders face on a near-daily basis.
An explosion of solution providers.
Over-marketing of tools.
Sound familiar? We thought so.
As a buyer, you need a way to approach the market and find the right tools at the right time.
This webinar is here to help.
Martin Burns is VP of Consulting Services for HireClix, founder of the Facebook TA tech group “Talent Product Plays”, and an experienced practitioner in corporate talent acquisition. He has led multiple recruitment organizations, selected, purchased, and implemented technology for firms ranging from 50 employees to over 50,000, as well as built products for the industry.
He brings a practical, informed view of TA technologies to the table and a rational blueprint for what can seem an overly complex challenge.
Why you need to recognize your employees? (15 reasons + tips)Vantage Circle
Discover the top reasons for employee recognition. Learn practical tips for creating an effective recognition program that benefits employees, managers, and the entire organization.
HRMantra is a cutting-edge HR technology solution that harnesses artificial intelligence for digital transformation of HR operations. It streamlines processes like attendance management, performance evaluations, project progress tracking, employee database management, and payroll processing with automated income tax & benefit plans calculations. Unlock productivity, compliance automation, and data-driven insights with this innovative HR cloud platform for the future of work.
The Rules Do Apply: Navigating HR ComplianceAggregage
https://www.humanresourcestoday.com/frs/26903483/the-rules-do-apply--navigating-hr-compliance
HR Compliance is like a giant game of whack-a-mole. Once you think your company is compliant with all policies and procedures documented and in place, there’s a new or amended law, regulation, or final rule that pops up landing you back at ‘start.’ There are shifts, interpretations, and balancing acts to understanding compliance changes. Keeping up is not easy and it’s very time consuming.
This is a particular pain point for small HR departments, or HR departments of 1, that lack compliance teams and in-house labor attorneys. So, what do you do?
The goal of this webinar is to make you smarter in knowing what you should be focused on and the questions you should be asking. It will also provide you with resources for making compliance more manageable.
Objectives:
• Understand the regulatory landscape, including labor laws at the local, state, and federal levels
• Best practices for developing, implementing, and maintaining effective compliance programs
• Resources and strategies for staying informed about changes to labor laws, regulations, and compliance requirements