As world economies reopen, businesses must adjust their risk management posture for the “new normal”, while continuing to drive digital transformation initiatives. The “new normal” has brought change to key risk vectors across people, process, and technology. To enable effective financial and operational controls, business teams must adapt to these changes and fully understand these new technology and security risks.
A key change has been a move to a work from home workforce. Organizations must rethink their approach to approach to enabling employee access to key enterprise systems and sensitive data.
In this session, we will share our thoughts on where new risks have emerged and traditional risks have changed. In addition, we will provide a point of view on the latest technologies and techniques to help you assess and control risks in enterprise systems that enable business finance and operations management.
Join SafePaaS CEO Adil Khan and Director Dan Miller at Altum Strategy Group.
Transform Unstructured Data Into Relevant Data with IBM StoredIQPerficient, Inc.
Recent studies indicate more than 90% of the world's data was created in the last 2 years, and organizational data is rising 20-50% year-over-year. As the amount of structured and unstructured data dramatically expands, the expense of maintaining data stores is outpacing the reduction in storage costs.
To help your organization address the issues associated with growing data capacity requirements, IBM offers StoredIQ, a leading unstructured data management and intelligent eDiscovery solution.
Learn about:
Data governance challenges
Information lifecycle governance implementation options
The benefits of early action when uncovering redundant, obsolete and trivial (ROT) content
Typical industry use cases
You'll also learn how to most effectively deploy IBM StoredIQ to be able to:
Analyze data sources in-place
Identify ROT content
Uncover personally identifiable information and sensitive data
Limit your compliance risks and reduce storage costs
Population Health Colloquium 2015: Mini Summit IV: Who is Your Champion of Cl...Perficient, Inc.
Oracle and Perficient presented at the 2015 Population Health Colloquium.
In this presentation thought leaders explored four types of change (Evolutionary, Disruptive, Imposed and Deliberate) and how all are needed in Healthcare. The discussion covered challenges and goals of integrating analytics (including retrospective data) into the clinician workflow within the EMR and how the Chief Informatics Officer is the best organizational role to champion analytics.
HIPAA Compliance and its Relationship to PharmacovigilancePerficient, Inc.
Most of us have heard of the United States Health Insurance Portability and Accountability Act (HIPAA) and how it protects the privacy of our health information and gives us access to it. While discussions around HIPAA arise more frequently among healthcare institutions such as hospitals, HIPAA also plays an integral role in the life sciences industry.
Perficient's Christi Cordeiro, safety and pharmacovigilance project manager, provided an overview of U.S. HIPAA rules and discuss their application to pharmacovigilance programs.
Disaster Recovery and Business Continuity for Your Clinical and Safety SystemsPerficient, Inc.
Your systems are up and running. You have no issues. It’s business as usual and all is as it should be. Then, suddenly, it’s not. A flood, an earthquake, a tornado or a fire threatens your organization’s ability to continue operating. Systems are offline, critical business processes have stalled. What damage has been inflicted? How long until you can recover? What do you do in the meantime? These are questions that no organization can properly answer without proper planning and testing.
The implications of an unplanned and unprepared-for event can be devastating to a company, as well as to the patients it serves. The only way to mitigate such risks is through comprehensive planning and testing.
Sean Bernard, lead business consultant in Perficient's life sciences practice, discussed why business continuity and disaster planning are so critical to life sciences companies, and shares best practices for preparing your company for the unforeseen.
IDERA Live | Business Value Metrics for Data GovernanceIDERA Software
You can watch the replay for this IDERA Live webcast, Business Value Metrics for Data Governance, on the IDERA Resource Center, http://ow.ly/imPU50A4rRC
As data professionals, we recognize and understand the need for data governance, focusing on data quality in particular. We have made progress in this area, as illustrated by the emergence of the Chief Data Officer role in recent years. However, in many organizations, the need for governance is still largely unrecognized, and remains very tough to sell internally. You may need some detailed information and metrics to demonstrate the business value. This session will focus on business justification for establishing a data governance framework, including:
-Data classification
-Data quality
-Business value metrics (KPIs)
-Alignment with Business Strategy
Speaker: Ron Huizenga is the Senior Product Manager of Enterprise Architecture and Modeling at IDERA. Ron has over 30 years of business and IT experience across many different industries including manufacturing, retail, healthcare, and transportation. His hands-on consulting experience with large-scale data development engagements provides practical, real-world insights to enterprise data architecture, business architecture, and governance initiatives.
While there is a lot of buzz about advanced IT analytics (AIA), the global research from leading IT analyst firm Enterprise Management Associates (EMA) highlights what is actually going on, who is successful and why.
These slides - based on the webinar featuring Dennis Drogseth, VP of research at EMA - cover why successful AIA deployments leverage more 3rd party sources (the average is 15), support more roles (the average is 11), and why 96% of respondents want to integrate service interdependency data into their AIA solutions.
These slides cover:
**What are the more popular types of advanced IT analytics (AIA), and how are they being used?
**How have advanced IT analytics adoption patterns and priorities changed over the last 2 years?
**Who is driving AIA organizationally in the real world?
PwC Point of View on Cybersecurity ManagementCA Technologies
During this session, participants will learn about PwC’s Cybersecurity Management framework that assists enterprises in identifying crown jewels, threats & risks in the environment, architectural gaps, and assists in building cyber resilience program.
For more information, please visit http://cainc.to/Nv2VOe
Transform Unstructured Data Into Relevant Data with IBM StoredIQPerficient, Inc.
Recent studies indicate more than 90% of the world's data was created in the last 2 years, and organizational data is rising 20-50% year-over-year. As the amount of structured and unstructured data dramatically expands, the expense of maintaining data stores is outpacing the reduction in storage costs.
To help your organization address the issues associated with growing data capacity requirements, IBM offers StoredIQ, a leading unstructured data management and intelligent eDiscovery solution.
Learn about:
Data governance challenges
Information lifecycle governance implementation options
The benefits of early action when uncovering redundant, obsolete and trivial (ROT) content
Typical industry use cases
You'll also learn how to most effectively deploy IBM StoredIQ to be able to:
Analyze data sources in-place
Identify ROT content
Uncover personally identifiable information and sensitive data
Limit your compliance risks and reduce storage costs
Population Health Colloquium 2015: Mini Summit IV: Who is Your Champion of Cl...Perficient, Inc.
Oracle and Perficient presented at the 2015 Population Health Colloquium.
In this presentation thought leaders explored four types of change (Evolutionary, Disruptive, Imposed and Deliberate) and how all are needed in Healthcare. The discussion covered challenges and goals of integrating analytics (including retrospective data) into the clinician workflow within the EMR and how the Chief Informatics Officer is the best organizational role to champion analytics.
HIPAA Compliance and its Relationship to PharmacovigilancePerficient, Inc.
Most of us have heard of the United States Health Insurance Portability and Accountability Act (HIPAA) and how it protects the privacy of our health information and gives us access to it. While discussions around HIPAA arise more frequently among healthcare institutions such as hospitals, HIPAA also plays an integral role in the life sciences industry.
Perficient's Christi Cordeiro, safety and pharmacovigilance project manager, provided an overview of U.S. HIPAA rules and discuss their application to pharmacovigilance programs.
Disaster Recovery and Business Continuity for Your Clinical and Safety SystemsPerficient, Inc.
Your systems are up and running. You have no issues. It’s business as usual and all is as it should be. Then, suddenly, it’s not. A flood, an earthquake, a tornado or a fire threatens your organization’s ability to continue operating. Systems are offline, critical business processes have stalled. What damage has been inflicted? How long until you can recover? What do you do in the meantime? These are questions that no organization can properly answer without proper planning and testing.
The implications of an unplanned and unprepared-for event can be devastating to a company, as well as to the patients it serves. The only way to mitigate such risks is through comprehensive planning and testing.
Sean Bernard, lead business consultant in Perficient's life sciences practice, discussed why business continuity and disaster planning are so critical to life sciences companies, and shares best practices for preparing your company for the unforeseen.
IDERA Live | Business Value Metrics for Data GovernanceIDERA Software
You can watch the replay for this IDERA Live webcast, Business Value Metrics for Data Governance, on the IDERA Resource Center, http://ow.ly/imPU50A4rRC
As data professionals, we recognize and understand the need for data governance, focusing on data quality in particular. We have made progress in this area, as illustrated by the emergence of the Chief Data Officer role in recent years. However, in many organizations, the need for governance is still largely unrecognized, and remains very tough to sell internally. You may need some detailed information and metrics to demonstrate the business value. This session will focus on business justification for establishing a data governance framework, including:
-Data classification
-Data quality
-Business value metrics (KPIs)
-Alignment with Business Strategy
Speaker: Ron Huizenga is the Senior Product Manager of Enterprise Architecture and Modeling at IDERA. Ron has over 30 years of business and IT experience across many different industries including manufacturing, retail, healthcare, and transportation. His hands-on consulting experience with large-scale data development engagements provides practical, real-world insights to enterprise data architecture, business architecture, and governance initiatives.
While there is a lot of buzz about advanced IT analytics (AIA), the global research from leading IT analyst firm Enterprise Management Associates (EMA) highlights what is actually going on, who is successful and why.
These slides - based on the webinar featuring Dennis Drogseth, VP of research at EMA - cover why successful AIA deployments leverage more 3rd party sources (the average is 15), support more roles (the average is 11), and why 96% of respondents want to integrate service interdependency data into their AIA solutions.
These slides cover:
**What are the more popular types of advanced IT analytics (AIA), and how are they being used?
**How have advanced IT analytics adoption patterns and priorities changed over the last 2 years?
**Who is driving AIA organizationally in the real world?
PwC Point of View on Cybersecurity ManagementCA Technologies
During this session, participants will learn about PwC’s Cybersecurity Management framework that assists enterprises in identifying crown jewels, threats & risks in the environment, architectural gaps, and assists in building cyber resilience program.
For more information, please visit http://cainc.to/Nv2VOe
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...EnergySec
After a brief introduction by Mr. Humphreys, Henry Bailey will talk a few minutes about SAP’s roadmap for utilities. This will be followed by a discussion led by Chris Humphreys about the evolutionary transition from disparate point solutions to enterprise-wide, end-to-end, Regulation Management where controls are consolidated and leveraged such that compliance is a byproduct of industry best practices. Finally, Mr. Rice and Chris Humphreys will end the hour with a presentation expanding on the concept of controls consolidation and compliance as a byproduct focused on NERC CIP Ver 3-5 and NIST transitional capabilities of Regulation Management.
Continuous Cyber Attacks: Engaging Business Leaders for the New NormalAccenture Technology
Organizations face a cyber crime wave that is increasing in intensity and sophistication. Business leaders must establish a holistic, end-to-end security strategy to protect the organization.
Leveraging Technology Using Keyword Analytics in Fraud and Compliance MonitoringJim Kaplan CIA CFE
Keyword analytics is the process of using data analytics to find keywords in both structured and unstructured data for detecting fraud and compliance review anomalies. It can be used by auditors, accountants and lawyers. This presentation from the 2015 TeamMate User Conference presented the results of the AuditNet Keyword Survey with tools and a comprehensive list of more than 4,000 keywords, social media terms, terrorist keywords and more.
General Data Protection Regulation (GDPR) Implications for Canadian Firmsaccenture
The General Data Protection Regulation (GDPR) represents significant challenges for financial institutions to comply with the new data processing and record keeping requirements. This Accenture Finance & Risk presentation explores the impact of GDPR on Canadian firms, including lessons learned from our work with clients and knowledge gained that can be used for an effective GDPR journey.
Leveraging Technology to Empower Patients and Reduce Healthcare CostsPerficient, Inc.
Telehealth, once reserved for the chronically ill, is now being used to drive increased revenue by creating services that scale beyond traditional geographic boundaries.
Perficient and KP OnCall discussed how telehealth is impacting healthcare and how the nation’s leading telehealth provider is leveraging innovative technologies to:
-Reduce patient visits and lower healthcare costs
-Empower patients through self-treatment
-Deliver alternate methods of patient/provider communication
-Manage symptoms and medical conditions for the patients and populations they serve
-Generate data-driven insights
Going Beyond the EMR for Data-driven Insights in HealthcarePerficient, Inc.
Join Dr. Marcie Stoshak-Chavez, MD, FACEP, Director of Healthcare Strategic Advisory Services at Perficient and Mr. J.D. Whitlock, Director of Clinical & Business Intelligence at Catholic Health Partners to learn how analytics is being used to measure and monitor performance and provide service-line directors and financial administrators with reporting and analysis that enhances clinical care processes and business operations.
Learn how clinicians and administrators armed with the data-driven insights from the EMR and beyond can:
Derive meaningful insights for care delivery by analyzing clinical, financial and operational data
Collaborate more effectively and improve quality of care by securely sharing insights among providers
Meaningfully measure and understand performance across key Federally mandated measures and take prescribed action
Stay on top of shifts in regulatory policy that impact reimbursements and quality requirements
Dataguise & MapR: Action Items for the Financial IndustryMapR Technologies
The risks and challenges for the financial industry have increased exponentially over the last few years. The key challenge has been to fully leverage big data without exposing or risking sensitive information.
Not only is the financial industry subject to a multitude of regulatory compliance issues in terms of data protection, they also face production challenges such as maintaining performance, scalability, and high availability.
This webinar was given on May 1st, 2014 and talked about:
- Best practices for achieving performance, reliability and protection of sensitive data in Hadoop deployments
- Innovative capabilities to help you meet regulatory compliance and risk management requirements
- Use cases to illustrate how big data can maximize returns on your investment, while minimizing risks
- The 5 action items you should take to get started
Speakers:
Jeremy Stieglitz, VP of Product Management, Dataguise
Dale Kim, Director of Product Marketing, MapR
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...Accenture Technology
Business theft and fraud have morphed into significant new threats as companies battle well-funded, highly motivated digital adversaries. Cyber defense rules have clearly changed.
Executive leaders must recognize how exposed their organizations are today and take steps to establish a holistic, end-to-end security strategy capable of protecting their most valuable assets and business operations.
3 Reasons Why Manufacturing Companies are Moving to Dynamics 365FONandita Nityanandam
In today's competitive landscape where manufacturers need to seamlessly connect devices, departments, and people across geographical boundaries, Dynamics 365, with new-age collaboration, productivity, and intelligence features, allows them to streamline every aspect of their manufacturing business while constantly enhancing employee productivity and customer satisfaction. Go through this presentation to know the top reasons for moving to Dynamics 365FO.
Digital Transformation 101 — How Will It Affect Your Business?PECB
Digital transformation means adapting to not only new technologies that are available but also changes in customer expectations, societal shifts, and industry disruptions. Businesses, in responding to these shifts, are needing to become more customer-focused, agile, adaptive to new opportunities, and efficient in order to stay competitive. Digital transformation is how they can rise to meet these expectations at scale.
As businesses undergo digital transformation they implement technology, processes, and big data to solve traditional business problems. These digitized strategies and new business models open up the potential for new streams of income, new partnerships, and a broader reach for the brand.
The webinar will covered:
• What is Digital Transformation?
• How will it affect your business operations?
• How to adapt in the Digital Transformation era?
YouTube video: https://youtu.be/e-GjiwCzUPg
Turning Critical Regulatory Findings Into Enterprise Organizational WinsAndrew Ames
Turning Critical Regulatory Findings Into Enterprise Organizational Wins. Identity Management isn't a tactical process, rather an IT controls journey, as many initiatives start with regulatory reporting pressures. Leverage those regulatory drivers to future proof for IT Controls and enable end user with enterprise identity and access management solutions.
Predictive Analytics to Discover Risk.
Organizations are seeking new ways to transform their rapidly growing data into insight that mitigates risks and unlocks new opportunities. However, using the traditional reporting tools to look for unusual patterns in large data sets is like finding a needle in a haystack.
The problem is not the resources, the personnel, or the data. It’s that many organizations simply don’t have the advanced analytics required to arrange the data, identify suspicious patterns and weaknesses; at least not fast enough. There’s too much data and not enough analytics!
We need a better way of knowing what the information means — of interpreting the data to discover an unknown business risk or opportunity as it happens or, even better, anticipate the next one. For most organizations, reducing transaction errors and misuse continues to be one of the largest untapped opportunities to manage costs, improve top-line revenue recognition, and ensure compliance with policies.
Join SafePaaS CEO Adil Khan as he discusses how to discover patterns in all types of structured and unstructured enterprise data, and use this insight to improve bottom line, significantly reduce cash leakage and post-audit recovery costs, improve revenue recognition timing, safeguard the integrity of financial statements, reduce the cost of internal and external audits, increase visibility into controls environment and mitigate exposure to fraud.
The IT Auditing Series is a series of 10 2-hour webinars.
The study program consists of 5 modules Basic and 5 modules Advanced spanning a broad range of topics and issues in the IT Auditing field. The emphasis in all webinars is therefore on practical aspects, of Internal Auditing.
The course content is based upon ISACA Framework which has been accepted world-wide as the basis of skills and competencies required for all IT Auditors.
This webinar covered Fundamentals of IT Audit
These slides - based on the webinar featuring Ingo Mierswa, CTO at RapidMiner, John Myers, managing research director at leading IT analyst firm Enterprise Management Associates (EMA), and Lyndsay Wise, research director at EMA - provide an overview of how to close the loop between predictive insights and action using big data analytics.
Project Control - Your Driver to Enterprise Profitability - Iain Graham, Sale...Mediehuset Ingeniøren Live
Keeping projects under control is a key for any Enterprise that runs projects driven businesses. Beyond collecting and gathering data to report what has happened, effective project control “best of breed” practices try today to include more analytical processes, which is mandatory pre-condition to drive each single project and the whole portfolio of projects performances to success.
This session will introduce you to significant business cases that leading existing Customers experienced by adopting EcoSys EPC Enterprise Planning & Control system.
Therefore, it will provide you with sample of benefits that You can gain after adopting state of the art technology and effective execution management practices to ensure most efficient control to your projects, and therefore to your business.
Banks and other financial services firms need to recognize the threats of cyber risk in a different way. Many have put in place thick walls to protect themselves. But firms cannot be protected at all times from a cyber-related incident. So putting in place structures, technologies and processes to ensure resilience—or fast recovery—is as much or more important than simply putting more locks on the doors or building stronger walls. See www.accenture.com/CyberRisk for more.
Gain business insight with Continuous Controls MonitoringEmma Kelly
Audit, Risk and Compliance managers have both an obligation and an opportunity to help their companies manage the most critical risks the current environment has either created or magnified. Now more than ever, organizations need to transform internal controls testing process from a manual collection of evidence to fine-grained monitoring controls that track user access to sensitive functions / data, system configurations, master data and transactions in
business-critical systems.
Continuously monitoring your business in real-time with actionable insight visible on drill-down, modern, dynamic dashboards allows for completeness and accuracy as well as time-efficient, cost-effective risk management decisions.
In this session, you will learn how Continuous Monitoring together with effective controls can prevent business losses and reduce the cost of audits. We will share best practices and provide case studies of clients that have automated monitoring controls in business-critical applications such as Oracle E-Business Suite and Oracle Cloud ERP to prevent risks in significant business processes such as Procure-to-Pay, Order-to-Cash, Hire-to-Retire, and Financial Record-to-Report.
Join Oracle GRC pioneers Appssurance Founder and CEO Brian O’Neil and SafePaaS CEO Adil Khan.
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...EnergySec
After a brief introduction by Mr. Humphreys, Henry Bailey will talk a few minutes about SAP’s roadmap for utilities. This will be followed by a discussion led by Chris Humphreys about the evolutionary transition from disparate point solutions to enterprise-wide, end-to-end, Regulation Management where controls are consolidated and leveraged such that compliance is a byproduct of industry best practices. Finally, Mr. Rice and Chris Humphreys will end the hour with a presentation expanding on the concept of controls consolidation and compliance as a byproduct focused on NERC CIP Ver 3-5 and NIST transitional capabilities of Regulation Management.
Continuous Cyber Attacks: Engaging Business Leaders for the New NormalAccenture Technology
Organizations face a cyber crime wave that is increasing in intensity and sophistication. Business leaders must establish a holistic, end-to-end security strategy to protect the organization.
Leveraging Technology Using Keyword Analytics in Fraud and Compliance MonitoringJim Kaplan CIA CFE
Keyword analytics is the process of using data analytics to find keywords in both structured and unstructured data for detecting fraud and compliance review anomalies. It can be used by auditors, accountants and lawyers. This presentation from the 2015 TeamMate User Conference presented the results of the AuditNet Keyword Survey with tools and a comprehensive list of more than 4,000 keywords, social media terms, terrorist keywords and more.
General Data Protection Regulation (GDPR) Implications for Canadian Firmsaccenture
The General Data Protection Regulation (GDPR) represents significant challenges for financial institutions to comply with the new data processing and record keeping requirements. This Accenture Finance & Risk presentation explores the impact of GDPR on Canadian firms, including lessons learned from our work with clients and knowledge gained that can be used for an effective GDPR journey.
Leveraging Technology to Empower Patients and Reduce Healthcare CostsPerficient, Inc.
Telehealth, once reserved for the chronically ill, is now being used to drive increased revenue by creating services that scale beyond traditional geographic boundaries.
Perficient and KP OnCall discussed how telehealth is impacting healthcare and how the nation’s leading telehealth provider is leveraging innovative technologies to:
-Reduce patient visits and lower healthcare costs
-Empower patients through self-treatment
-Deliver alternate methods of patient/provider communication
-Manage symptoms and medical conditions for the patients and populations they serve
-Generate data-driven insights
Going Beyond the EMR for Data-driven Insights in HealthcarePerficient, Inc.
Join Dr. Marcie Stoshak-Chavez, MD, FACEP, Director of Healthcare Strategic Advisory Services at Perficient and Mr. J.D. Whitlock, Director of Clinical & Business Intelligence at Catholic Health Partners to learn how analytics is being used to measure and monitor performance and provide service-line directors and financial administrators with reporting and analysis that enhances clinical care processes and business operations.
Learn how clinicians and administrators armed with the data-driven insights from the EMR and beyond can:
Derive meaningful insights for care delivery by analyzing clinical, financial and operational data
Collaborate more effectively and improve quality of care by securely sharing insights among providers
Meaningfully measure and understand performance across key Federally mandated measures and take prescribed action
Stay on top of shifts in regulatory policy that impact reimbursements and quality requirements
Dataguise & MapR: Action Items for the Financial IndustryMapR Technologies
The risks and challenges for the financial industry have increased exponentially over the last few years. The key challenge has been to fully leverage big data without exposing or risking sensitive information.
Not only is the financial industry subject to a multitude of regulatory compliance issues in terms of data protection, they also face production challenges such as maintaining performance, scalability, and high availability.
This webinar was given on May 1st, 2014 and talked about:
- Best practices for achieving performance, reliability and protection of sensitive data in Hadoop deployments
- Innovative capabilities to help you meet regulatory compliance and risk management requirements
- Use cases to illustrate how big data can maximize returns on your investment, while minimizing risks
- The 5 action items you should take to get started
Speakers:
Jeremy Stieglitz, VP of Product Management, Dataguise
Dale Kim, Director of Product Marketing, MapR
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...Accenture Technology
Business theft and fraud have morphed into significant new threats as companies battle well-funded, highly motivated digital adversaries. Cyber defense rules have clearly changed.
Executive leaders must recognize how exposed their organizations are today and take steps to establish a holistic, end-to-end security strategy capable of protecting their most valuable assets and business operations.
3 Reasons Why Manufacturing Companies are Moving to Dynamics 365FONandita Nityanandam
In today's competitive landscape where manufacturers need to seamlessly connect devices, departments, and people across geographical boundaries, Dynamics 365, with new-age collaboration, productivity, and intelligence features, allows them to streamline every aspect of their manufacturing business while constantly enhancing employee productivity and customer satisfaction. Go through this presentation to know the top reasons for moving to Dynamics 365FO.
Digital Transformation 101 — How Will It Affect Your Business?PECB
Digital transformation means adapting to not only new technologies that are available but also changes in customer expectations, societal shifts, and industry disruptions. Businesses, in responding to these shifts, are needing to become more customer-focused, agile, adaptive to new opportunities, and efficient in order to stay competitive. Digital transformation is how they can rise to meet these expectations at scale.
As businesses undergo digital transformation they implement technology, processes, and big data to solve traditional business problems. These digitized strategies and new business models open up the potential for new streams of income, new partnerships, and a broader reach for the brand.
The webinar will covered:
• What is Digital Transformation?
• How will it affect your business operations?
• How to adapt in the Digital Transformation era?
YouTube video: https://youtu.be/e-GjiwCzUPg
Turning Critical Regulatory Findings Into Enterprise Organizational WinsAndrew Ames
Turning Critical Regulatory Findings Into Enterprise Organizational Wins. Identity Management isn't a tactical process, rather an IT controls journey, as many initiatives start with regulatory reporting pressures. Leverage those regulatory drivers to future proof for IT Controls and enable end user with enterprise identity and access management solutions.
Predictive Analytics to Discover Risk.
Organizations are seeking new ways to transform their rapidly growing data into insight that mitigates risks and unlocks new opportunities. However, using the traditional reporting tools to look for unusual patterns in large data sets is like finding a needle in a haystack.
The problem is not the resources, the personnel, or the data. It’s that many organizations simply don’t have the advanced analytics required to arrange the data, identify suspicious patterns and weaknesses; at least not fast enough. There’s too much data and not enough analytics!
We need a better way of knowing what the information means — of interpreting the data to discover an unknown business risk or opportunity as it happens or, even better, anticipate the next one. For most organizations, reducing transaction errors and misuse continues to be one of the largest untapped opportunities to manage costs, improve top-line revenue recognition, and ensure compliance with policies.
Join SafePaaS CEO Adil Khan as he discusses how to discover patterns in all types of structured and unstructured enterprise data, and use this insight to improve bottom line, significantly reduce cash leakage and post-audit recovery costs, improve revenue recognition timing, safeguard the integrity of financial statements, reduce the cost of internal and external audits, increase visibility into controls environment and mitigate exposure to fraud.
The IT Auditing Series is a series of 10 2-hour webinars.
The study program consists of 5 modules Basic and 5 modules Advanced spanning a broad range of topics and issues in the IT Auditing field. The emphasis in all webinars is therefore on practical aspects, of Internal Auditing.
The course content is based upon ISACA Framework which has been accepted world-wide as the basis of skills and competencies required for all IT Auditors.
This webinar covered Fundamentals of IT Audit
These slides - based on the webinar featuring Ingo Mierswa, CTO at RapidMiner, John Myers, managing research director at leading IT analyst firm Enterprise Management Associates (EMA), and Lyndsay Wise, research director at EMA - provide an overview of how to close the loop between predictive insights and action using big data analytics.
Project Control - Your Driver to Enterprise Profitability - Iain Graham, Sale...Mediehuset Ingeniøren Live
Keeping projects under control is a key for any Enterprise that runs projects driven businesses. Beyond collecting and gathering data to report what has happened, effective project control “best of breed” practices try today to include more analytical processes, which is mandatory pre-condition to drive each single project and the whole portfolio of projects performances to success.
This session will introduce you to significant business cases that leading existing Customers experienced by adopting EcoSys EPC Enterprise Planning & Control system.
Therefore, it will provide you with sample of benefits that You can gain after adopting state of the art technology and effective execution management practices to ensure most efficient control to your projects, and therefore to your business.
Banks and other financial services firms need to recognize the threats of cyber risk in a different way. Many have put in place thick walls to protect themselves. But firms cannot be protected at all times from a cyber-related incident. So putting in place structures, technologies and processes to ensure resilience—or fast recovery—is as much or more important than simply putting more locks on the doors or building stronger walls. See www.accenture.com/CyberRisk for more.
Gain business insight with Continuous Controls MonitoringEmma Kelly
Audit, Risk and Compliance managers have both an obligation and an opportunity to help their companies manage the most critical risks the current environment has either created or magnified. Now more than ever, organizations need to transform internal controls testing process from a manual collection of evidence to fine-grained monitoring controls that track user access to sensitive functions / data, system configurations, master data and transactions in
business-critical systems.
Continuously monitoring your business in real-time with actionable insight visible on drill-down, modern, dynamic dashboards allows for completeness and accuracy as well as time-efficient, cost-effective risk management decisions.
In this session, you will learn how Continuous Monitoring together with effective controls can prevent business losses and reduce the cost of audits. We will share best practices and provide case studies of clients that have automated monitoring controls in business-critical applications such as Oracle E-Business Suite and Oracle Cloud ERP to prevent risks in significant business processes such as Procure-to-Pay, Order-to-Cash, Hire-to-Retire, and Financial Record-to-Report.
Join Oracle GRC pioneers Appssurance Founder and CEO Brian O’Neil and SafePaaS CEO Adil Khan.
How to determine a proper scope selection based on ISO 27001?PECB
Meeting Clause 4 - Context of the Organization "generic" requirements of ISO 27001 in order to determine a proper Documented Scope statement that meets business requirements and gives value to products and/or services.
Main points that have been covered are:
• Interested Parties
• Interfaces & Dependencies
• Legal / Regulatory & Contractual Obligations (Risk of Non-Compliance)
• Documented Scope Statement (including locations within Scope)
Presenter:
Mr. David Anders has worked more than 20+ years in the risk management field managing a broad spectrum of consulting services and product solutions. David has worked in the consulting field for 16 years and is the founder / CEO of SecuraStar, LLC, a niche ISO 27001 consulting firm in the United States and founder / CEO of ISMS Manager Software, LLC.
Link of the recorded session published on YouTube: https://youtu.be/hSaAvKgAC2c
Business Value Metrics for Data GovernanceDATAVERSITY
As data professionals, we recognize and understand the need for data governance, focusing on data quality in particular. We have made progress in this area, as illustrated by the emergence of the Chief Data Officer role in recent years. However, in many organizations, the need for governance is still largely unrecognized, and remains very tough to sell internally. You may need some detailed information and metrics to demonstrate the business value. This session will focus on business justification for establishing a data governance framework, including:
Data classification
Data quality
Business value metrics (KPIs)
Building Your DPIA/PIA Program: Tips & Case Studies [TrustArc Webinar Slides]TrustArc
Watch the webinar on-demand: https://info.trustarc.com/building-pia-dpia-program-webinar.html
DPIA/PIA guidance, tips for success and case studies from the field.
The GDPR mandates Privacy by Design and requires documented Data Protection Impact Assessments (DPIAs) for high risk processing. How can you build this into a sustainable program across your business? Having a good understanding of what DPIA/PIAs are and how to implement them can be the key to embedding privacy in the heart of your organization as well as achieving GDPR compliance.
Watch this webinar on-demand to:
- Hear PIA best practices
- Review GDPR compliance requirements
- Receive a range of tips and tools to help streamline and embed the process
- Hear how Volvo Financial Services has approached assessments across their organization
To register for upcoming/on-demand webinars visit: https://www.trustarc.com/events/webinar-schedule/
The path to a Modern Data Architecture in Financial ServicesHortonworks
Delivering Data-Driven Applications at the Speed of Business: Global Banking AML use case.
Chief Data Officers in financial services have unique challenges: they need to establish an effective data ecosystem under strict governance and regulatory requirements. They need to build the data-driven applications that enable risk and compliance initiatives to run efficiently. In this webinar, we will discuss the case of a global banking leader and the anti-money laundering solution they built on the data lake. With a single platform to aggregate structured and unstructured information essential to determine and document AML case disposition, they reduced mean time for case resolution by 75%. They have a roadmap for building over 150 data-driven applications on the same search-based data discovery platform so they can mitigate risks and seize opportunities, at the speed of business.
FDA News Webinar - Inspection IntelligenceArmin Torres
Developing a Digital Data-Driven Approach to preparing for FDA Inspections. Using Data Analytics to proactively monitor internal and external Quality & Compliance data sources.
Deliver the ‘Right’ Customer Experience without Compromising Data SecuritySPLICE Software
Today’s customers are demanding more real-time interaction. Yet, in this digital world, data vulnerability and cyber-attacks against insurers and financial institutions are becoming an increasingly frequent and sophisticated reality. This webinar shares key insights needed to implement modern solutions that improve your customer’s experience while reducing the risk of cyber threats - protecting your company and your customers from attacks.
Alliance session 4373 risk management from on premise to the cloud – a foc...Smart ERP Solutions, Inc.
Lewis Hopkins, Senior Applications Consultant, Smart ERP Solutions, Inc. This session focuses on how organizations can manage their risks and automate reporting and controls over security within their PeopleSoft Application
How to Centre your PCI Programme Around your Business Objective - SureCloud SureCloud
SureCloud will explore the challenges that organisations face when achieving and maintaining compliance with PCI DSS, with a particular focus on how organisations can design and deploy a programme that aligns with wider business objectives and embeds compliance activities into business operations.
The session will be structured around our case study organisation, Bananas to help bring this use case to life.
At the Synopsys Security Event - Israel, Girish Janardhanudu, VP Security Consulting, Synopsys presented on software security. For more information, please visit us at www.synopsys.com/software
TrustedAgent GRC supports several initiatives within the Public Sector including FISMA, FedRAMP, cyber incident management, NIST SP 800-37 Rev 1., DIACAP and CNSSI-1253, and DIACAP to NIST RMF Migration. Additional TrustedAgent also streamlines activities related to DFARS 252.204-7012 and NIST 800-171.
Right time to Outsource your healthcare services to Avantha Business Solutionsavanthabsl
Ensure Maximum Profit margin at a minimal cost. Outsource to Avantha Business Solutions who have unmatched ability to grow its client’s businesses by innovating to improve client’s back-office processes.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.