Webinars

Webinars

  • How HR Automation Can Help Solve the Talent Supply Crisis

    We know the labor supply is at a critical level. WE CAN'T HIRE ANYONE. Not only can't we find people...but, they often lack the necessary knowledge, skills, and experience. Unlike previous cycles, we cannot simply "wait it out." There is no pool to fall back on. An aging workforce plus lower birthrates, low immigration, an exodus of parents due to unaffordable or unavailable daycare, explosive growth in the gig workforce, and other factors decimated the available number of people available. The push for 4-year colleges drove students out of the trades; the pandemic has an unmeasurable long-term negative impact on student learning, and a significant decline in interpersonal skills, learning capability, problem-solving, and basic working capabilities makes it impossible for many employers to hire available labor without significant upskilling and retraining. There is no quick fix to the problem we are facing today across all industries, but HR plays a critical role. Automation saves time for themselves, managers, executives, and employees and so HR can focus on the things that matter most. During this session, participants will: • Show how automation can streamline HR functions and expedite time to hire, quality of hire, time to proficiency, and performance. • Consider the need for automation and where HR can implement it to optimize impact throughout the organization. • Identify best practices to begin the automation process. • Evaluate the automation process. • Walkthrough steps to select the best system to match the process. • Consider appropriate success metrics to decide upon systems, build implementation models, and create accountabilities for success. • Learn how to incorporate program evaluations and accountability structures to achieve success. • Have fun!! Read More

  • How to Keep up with the Cyber Threat Landscape

    Data breaches increased a staggering 68% in 2021, according to Identity Theft Resource Center's annual report, affecting individuals, municipalities and nation states, businesses large and small, and public utilities and resources. Attacks involving ransomware more than doubled, and the most popular business targets were in manufacturing and utilities. Understanding these trends and anticipating how and why attackers might single out your business operations or employees is critical to mitigation. This panel of security experts will explore the current state of cybersecurity and how to use threat intelligence and threat hunting to identify risk and avert disaster. Join us to learn about: -- The new breed of cyber criminals and why they attack -- The types of breaches your business should fear most -- The best sources of threat intelligence -- How threat hunting and threat modelling can help your business proactively deter attackers -- How to increase security awareness throughout the organization Panelists include: Michael Pepin, CISSP, Sr. Security Architect, Clumio Carl Leonard, Cybersecurity Strategist, Proofpoint Sources: Proofpoint 2022 Voice Of The CISO report https://www.proofpoint.com/uk/resources/white-papers/voice-of-the-ciso-report Proofpoint The Human Factor 2021 https://www.proofpoint.com/uk/resources/threat-reports/human-factor Verizon Data Breach Investigations Report 2021 https://www.verizon.com/business/resources/reports/dbir/2021/masters-guide/ Read More

  • AI & ethics: how to ensure talent assessment is fair

    In a landscape in which organisational agility and transformation are always on client agendas, AI has the potential to do much good. The combination of huge processing power and advanced psychology can enable organisations to build the workforce they really need, both now and in the future. AI and automation may not yet be living up to its promises, but adoption of AI, fuelled by significant investment, is happening quickly. An overall shift towards data-based decision-making and evidence-based HR practices thanks to the volume of data now available, have bought the spotlight onto people functions. In a crowded and rapidly developing marketplace, HR and recruitment technology buyers need to be wise about choosing products and providers. So how can you ensure your tech is making fair talent decisions powered by AI? During this webinar Dr. Alan Bourne, CEO & Founder of Sova and Jarret Hardie, CTO of Sova will discuss: • How AI is currently being used in recruitment and talent development • What is ethically applied AI • How to ensure your technology is using ethically applied AI • The potential and future of AI in recruitment and talent development Read More

  • New Data On 1000+ Employers: Hiring Technologies They Plan to Buy This Year

    "Phone a friend." In the old game show, that was a way to get help on a tricky question. Today, we don't have to just rely on that to find new talent. Based on a brand-new research study, we'll dive into the hiring trends affecting employers as well as their plans to leverage technology. In addition to the technology component, we'll examine why and when employers plan to add recruiting headcount instead of technology and vice versa. This session will be a practical look at the intersection of your talent team and your talent technology stack -- so don't miss out! Read More

  • Use bad-guy trends, tactics and techniques against them for effective strategy

    The bad news? Data breaches now play a role in ransomware and extortion attacks, espionage, cyber fraud, business-email compromise, and more. The good news? As security vendors and internal security teams up their game, threat actions are converging, and threat actors now have only so many initial attack vectors to break in and do bad things. You must simplify your prevention strategy to develop an effective means to stop data breaches, regardless of the flavor of attack. But how? Join Nick Cavalancia to explore how you can elevate your data breach prevention strategy by viewing it through the lens of threat actor actions. Topics will include: • Start with the bad guy and work backwards to strategy. • Focus on initial attack vectors. • Translate threat actions into practical prevention strategy. • Lessons from MITRE’s ATT&CK Framework and industry trends. Read More

  • Decoding CUI: A Highly Valued Data Type at Risk

    Certain types of unclassified information are extremely sensitive, sought after by strategic competitors and adversaries, and often have legal safeguarding requirements. Controlled Unclassified Information (CUI) is government-created or -owned information that requires safeguards or dissemination controls consistent with laws, regulations and government policies. Like Personal Data (PD) and Personally Identified Information (PII), CUI is highly-valued information, requiring better understanding by cybersecurity and compliance professionals. In this presentation, we dive into the essential aspects of CUI, such as • CUI concepts and NIST standards. • The CUI registry, categories and markings. • What cybersecurity and compliance professionals must know to protect CUI. Read More

  • Faster Breach Detection

    Breaches happen by clever and well-armed cybercriminals who use many tactics, techniques, and procedures to infiltrate IT infrastructure, implant malware, and execute attacks. There is a lot at stake, so you need to know as much as possible with little or no delay to minimize adverse consequences. Network monitoring that pipelines packets from the core network to cybersecurity analysts and analytics is the foundation of detecting and responding. Stealth is an often-used weapon, so monitoring with the highest possible fidelity is necessary to detect increasingly subtle Indicators of Attack and Indicators of Compromise. This webinar will provide a stepwise plan for achieving faster breach detection and maximizing resilience to cyber risks by showing you how to: • Instrument any network, physical, virtual, hybrid-cloud, for high-fidelity monitoring to losslessly acquire and reliably deliver network packet data to SOC and SecOps security analysts and the analytics and tools they use • Capture, store, and organize network packet data for use as security evidence • Forensically analyze security evidence to facilitate a rapid and effective response Read More

  • Five Ways HR Leaders Can Make the Most of Their Technology Investments

    As HR leaders work to manage remote work, they are increasingly investing in tech that enables them to do more. PwC has proof that HR tech is delivering, with particularly big benefits from the cloud. However, HR leaders can still do better to encourage tech adoption, choosing the right vendor and gaining leadership buy-in for cutting-edge tech. Summit attendees will learn how HR leaders can better encourage tech adoptions and how tech can enable your HR functions to achieve its full value. In this talk, Dan will explore the notions of tracking employees' productivity and performance and how likely organizations are to switch HR technology vendors at the end of subscription terms. The themes covered will stem from PwC's recent HR Technology survey findings, which we fielded to understand trends in HR tech and transformation, surveying US HR professionals such as middle managers and above, working in HR or in an IT department supporting HR. Read More

  • Technology Brings HR to a New Level

    Human resources professionals have experienced unprecedented changes in the last few years. Faced with an abruptly remote workforce, expectations to improve diversity, emphasis on employee experience, and the tumult of the Great Resignation, HR teams have adopted a variety technologies to help manage their challenges. As workplaces continue to evolve, technology will prove to be even more important for facilitating core HR operations, recruitment, employee wellness, training programs and more. This panel of HR technology experts will discuss the hot technologies transforming the field, including artificial intelligence, augmented and virtual reality, blockchain, and robotic process automation. Join us to hear learn how: -- AI and VR can accelerate the recruitment and hiring process -- Bots can be implemented to execute common HR processes -- Interactive apps can help measure and encourage employee wellness -- Blockchain can securely transmit financial and sensitive information -- Self-service platforms can improve efficiency and facilitate employee learning and advancement Moderated by: David Essex, Industry Editor, TechTarget Panelists include: Charles Handler, President, Sova Assessment Katherine Jones, Independent Thought Leader and Consultant Brian Sommer, Founder/President, TechVentive Read More

  • The application attack Threat Landscape- after Log4J

    Modern web applications have become complex, heavily reliant on APIs for virtually every online interaction. This complexity brings with it the potential for new entry points for hackers and unfortunately more overhead for the business to manage and track. Akamai’s Director of Security Technology and Strategy, Sean Flynn, takes us behind the scenes of how attackers look for new vulnerabilities and used obfuscation to prolong Log4J zero-day attacks. In this webinar, you will also learn about: - a new reflection/amplification distributed denial-of-service (DDoS) vector with a record-breaking potential amplification ratio of 4,294,967,296:1 - why attackers focus more on APIs than traditional applications - what companies can do to stay ahead of future threats Read More