Archive for March 8th, 2017

IT Asset Management & Cybersecurity

Share

Live Webinar – March 15th, 2016 6:00 am – 10:00 am EDT
Live Webinar – March 15h, 2016 2:00 PM – 3:00 PM BT
Activity Type: Education – Course or Training  1 Hour  1 PDU free
Provider: APM a division of  APMG International

Cybersecurity is all about IT assets.  When companies are hacked, it is through their IT assets; their networks, hardware, and software are the points of entry for cyber attackers.

Start with the basics.

You can’t defend what you don’t know you have. And this goes beyond those easily identifiable PC’s.

An enterprise is made up of desktop devices, servers, mobile devices, networks, possibly in different geographic locations operated by different people.

Do you have an end-to-end view of your total IT asset management environment?

And do you have business processes in place help you control what is on those devices and what levels of authority are permitted for different classes of users?

IT Asset Management is often underfunded and undermanaged within organizations, usually because responsibility is shared between disparate departments and frankly, because it is just isn’t considered all that exciting.

But few things can create as much vulnerability to cyber-attack as a poorly designed, if not ad hoc, IT asset management program.

Join Greg and lean how to mitigate your organizational risk!

Presenter:  Greg Witte (LinkedIn profile) is a senior cybersecurity engineer, supporting commercial and government clients for G2, Inc., and co-author of Security Automation Essentials: Streamlined Enterprise Security Management & Monitoring with SCAP and Implementing the NIST Cybersecurity Framework

Greg was a core member of the team to create the Framework to Improve Critical Infrastructure Cybersecurity, a publication developed by the National Institute for Standards and Technology (NIST) in response to Presidential Executive Order 13636 to provide a common language for communicating, assessing, and reporting cybersecurity risk management objectives. He continues to help update and implement that Framework internationally.

Click to register for:
IT Asset Management & Cybersecurity

0 0 1.0
Technical Project Management Leadership Strategic & Business Management

NOTE: For PMI® Audit Purposes – Print Out This Post!  Take notes on this page during the presentation and also indicate the Date & Time you attended. Note any information from the presentation you found useful to your professional development and place it in your audit folder.

Share

Live Webinar March 15th, 2017, 10:00 am – 11:00 am  EDT
Activity Type: Education – Course or Training  1 Hour  1 PDU
Provider: Gartner Webinars

Awareness of the rapid increase in targeted cyberattacks and the resulting breadth and depth of financial, operational and reputational impact is skyrocketing in boardrooms.

Organizations must integrate computer security incident response processes with those of business continuity management to ensure effective and timely responses.

In this webinar Roberta J. Witty Gartner Research VP (LinkedIn profile, Gartner bio) will discuss the key areas on which to focus your BCM efforts if your organization is a victim of such an event.

Discussion Topics:

  • Why a targeted cyberattack must be considered a
    business disruption
  • How the CSIRT process can benefit from BCM best practices
  • Best practices that will align BCM and CSIRT

Click to register for:
Managing An Aggressive
Business Disruption Cybersecurity Attack

0 0 1.0
Technical Project Management Leadership Strategic & Business Management

NOTE: For PMI® Audit Purposes – Print Out This Post!  Take notes on this page during the presentation and also indicate the Date & Time you attended. Note any information from the presentation you found useful to your professional development and place it in your audit folder.

Share

Live Webinar March 14th, 2017, 2:00 pm – 3:00 pm EDT
Activity Type: Education – Course or Training  1 Hour  1 PDU
Provider:  StickyMinds/Techwell

Test automation, continuous integration (CI), and reliable test data provisioning are all key elements to making DevOps work, as they provide the necessary capabilities to quickly and securely test and release software.

Without these technologies, the DevOps promise of rapidly deploying new services and applications is only a dream.

Effectively managing test data reduces risk when implementing CI and DevOps, along with accelerating release cycles, improving quality, and cutting costs.

Join this web seminar to learn how to execute an integrated test data management approach that will deliver seamless automation, efficiency, and security to your DevOps and continuous integration efforts.

Learn:

  1. How self-service test data powers DevOps and CI implementations
  2. How organizations have saved millions and slashed development cycles
  3. Common oversights when employing automation and DevOps
  4. How to release applications faster with confidence through improved collaboration, automation, and visibility

Click to register for:
Power DevOps Efficiency & Test Automation
With Seamless Data Management

0 0 1.0
Technical Project Management Leadership Strategic & Business Management

NOTE: For PMI® Audit Purposes – Print Out This Post!  Take notes on this page during the presentation and also indicate the Date & Time you attended. Note any information from the presentation you found useful to your professional development and place it in your audit folder.

Share

Live Webinar March 16th, 2017 – 1:00 pm – 2:00 pm EDT
Activity Type: Education – Course or Training  1 Hour  1 PDU free
Provider: ProjectManagement.com / Gantthead (REP #2488)
Once viewed your PDU Will automatically Be recorded with PMI®

ProjectManagement.com / Gantthead premium content
Is available to PMI® members.

The topic of Game Theory is often presented or thought of as being highly complex.

It doesn’t have to be – in fact, there are many basic precepts of Game Theory that can be of particular help to those finding that advancement in their organizations isn’t always based on merit.

In this session Michael Hatfield (LinkedIn profile) will present a step-by-step guide to what Game Theory is, why it’s considered a source of insight, and how it can help you navigate the treacherous waters and inky depths of career advancement.

Webinar participants will finish the presentation with an enhanced knowledge of the tactics and strategies available to them in the game of corporate snakes and ladders, and how to more readily recognize when these strategies and tactics are being used by others.

Note: You have to sign in to ProjectManagement.com with your PMI® credentials to register for this opportunity. If you are not signed in with your PMI® credentials you will not see the “Register for this webinar” link

Registration for these sessions fill quickly! If the registration is closed they are at maximum capacity for the live webinar.

An on-demand recording will be available at the link below
within 72 hours of the live session.

Click to register for:
Getting Ahead With Practical Game Theory

0 1.0 0
Technical Project Management Leadership Strategic & Business Management

NOTE: For PMI® Audit Purposes – Print Out This Post!  Take notes on this page during the presentation and also indicate the Date & Time you attended. Note any information from the presentation you found useful to your professional development and place it in your audit folder.