Breaking Down the No Surprises Act

The "No Surprises Act" went into effect on Jan. 1, 2022. This new legislation addresses medical billing issues at the federal level and establishes transparency and patient protections against surprise medical bills.

In our webinar, we'll discuss everything you need to know about the new law such as:

  • Understanding what it entails and why
  • Advice on compliance*
  • Easy-to-use solutions

By the end of this session, you will have a better understanding of what the No Surprises Act entails, advice on how to stay compliant, and easy-to-use solutions to save you time.

* Not legally binding

View Now

Recognizing And Addressing Hiring Biases

When you’re a part of a hiring team, your job is to find the best candidates. However, this becomes a challenge when unconscious biases come into play.

Fortunately, there are a number of strategies that you can employ in order to shut down bias before they creep in.

In this pre-recorded webinar we met with Kehsi Iman Wilson, a DE&I and social justice trainer and educator, and CEO of High Quality Talent.

Key takeaways from the webinar:

  • Actionable steps you can take to provide recruiters with training on biases and hiring
  • Examined strategies to manage the unconscious biases we all hold
  • How to make the hiring process more inclusive
  • The effectiveness of blind recruitment, and whether it should be implemented
  • How to come up with an impersonal resume review system
  • Diversity and inclusion job boards that recruiters should be looking at

Learn how to recognize and address hiring biases at your organization!

View Now

Recruitment Metrics to Power Your Hiring Strategies

Did you know that 71% of companies see people analytics as a high priority, but only 8% report they have usable data, according to Deloitte?

Utilitizing recruitment metrics allows you to evaluate your hiring process and ensure that you stay on track with your company’s strategies and goals.

In this pre-recorded, 45 minute webinar, we were joined by Richard Brown, Lead Talent and DE&I Business Partner at McLaren Racing, to discuss the recruitment metrics that have helped them to improve their DE&I progress.

Brown deep-dives into the following:

  • How recruitment metrics are set up at McLaren Racing
  • How these metrics impact everyday business decisions
  • Ways to recruit more intelligently using real-life examples

Learn how to use recruitment metrics to power your hiring strategies!

View Now

How To Get Your Employer Branding Right

The best talent has plenty of options, so differentiating your organization is critical. The time to start thinking about positioning your company as a great employer is long before you ever post a job or interview a candidate.

In this pre-recorded, 45 minute webinar, we were joined by Maria Rodriguez, Global HR Director of HireRight, where we discussed:

  • How companies can maintain a strong employer brand during times of crisis and the story they should be telling
  • How recruiters and hiring managers who don’t have buy-in from management can get support for employer branding initiatives
  • How can hiring professionals ensure their employer branding is both authentic and compelling
  • The best ways to measure the success of employer branding campaigns

Learn how you can shape your employer brand so that it is both authentic and compelling to candidates and employees.

View Now

OSS Supply Chain Security and How to Help Your Overburdened Dev Team

In this Upstream chat, Tracy Bannon from MITRE joined us to discuss why it took so long, what is happening now that will help organizations positively impact their own security preparedness, and how we can bring forward good ideas and warnings in the future.

She discussed how to talk about risk profile and ways organizations can force-rank priorities. She also discussed why it’s important to reduce cognitive load on the development teams and why it’s important to offload some tasks onto trusted vendors.

Tidelift CEO and co-founder Donald Fischer then joined the discussion and explained how all this applies to open source software specifically. Donald and Tracy discussed the recently disclosed security vulnerability in the Apache log4j project, which has been dubbed “Log4Shell”, why it’s important to address quickly, how to address it, and how to better prepare for future vulnerabilities. You won't want to miss this.

View Now

Everything You Need to Know About the Log4Shell Vulnerability

Log4j is a popular library for logging things in Java applications. Practically every organization that uses Java (Maven/Gradle) uses Log4j and has likely been impacted by the log4shell vulnerability.

In this 20-minute briefing, Tidelift solutions architect lead Mark Galpin shares what you need to know about the recent Log4Shell vulnerability—and demos how Tidelift can help.

Mark breaks down the current situation and shares tips for remediating the issue. You won't want to miss this.

View Now

Galileo Cloud Compass

Don't Overpay for Cloud!

KNOW BEFORE YOU GO

Galileo’s Cloud Compass will help you evaluate your servers and connected storage and compare it to the current pricing data from Azure, AWS, & IBM so you can make an intelligent cloud decision in minutes.

Cloud Compass can provide fast insight into thousands of systems and easily spot waste. (Yes, even AIX & IBM i) It consistently helps businesses of all sizes realize drastic savings on their monthly cloud bills. In this demo, you’ll see how GCC helped one customer cut $50,000 a MONTH off their cloud bill! So what kind of savings will it uncover for you? Watch the demo to find out.

INSIDE THE DEMO:

RIGHT-SIZING

Intelligently size your cloud environment based on peak workloads from your existing architecture.

PRICE ANY CLOUD

Upload user-defined pricing to show cost information for ANY cloud, including your on-prem infrastructure!



COMPARE YOUR
SAVINGS

See multiple cloud options
side-by-side with new pricing profile cards.

ANALYZE EVERYTHING

Perform in-depth cost analysis with enhanced tables that allow you to pivot, group, filter, and more.

View Now

DevOps: Taking Your Infrastructure to the Next Level

High-performing DevOps teams state a 106x faster lead time, and a 7x lower change failure rate, than their lower-performing peers in a 2019 DORA/Google Cloud survey.

Already sold on DevOps? How well is your DevOps organization performing? What's your next step?

Join discussion on how simulation can help you level up your DevOps practices.

What you will learn:

  • How to remove bottlenecks caused by lack of hardware availability
  • Why (and how) choosing accuracy vs. speed may help you go faster
  • How nondestructive testing can save you money
  • How to test on 1 or 100 devices without doing 100x the work

View Now

Deploying Containers in a RTOS World

Embedded development is modernizing and transforming digitally, changing forever — and for good. The Internet of Things and the advent of intelligent systems require network connectivity to collect data that can be used for monitoring and analytics. This persistent connectivity calls for constant upgrades and new capabilities as well as rapid fixes for security issues. One of the most efficient and effective ways to accomplish this is through containers.

This demonstration and discussion will touch on some of the embedded use cases where it makes sense to leverage container technology on an RTOS. We will show you how containers can empower a software developer to leverage open source, extend functionality after deployment, and adapt to changing specifications.

What you will learn:

  • Use cases for containers on both Linux and VxWorks
  • How to resource partitioning to maximize container benefits
  • How to rapidly deploy a new application for VxWorks using containers

View Now

10 Best Practices for Secure Embedded Systems

Learn the latest threats to your embedded systems and how to protect against them — even when attackers have already struck.

The number of security flaws published last year made 2020 the fourth consecutive year to break records in the number of recorded vulnerabilities (US-CERT Vulnerability Database). We must change how we think about securing embedded systems.

Join Wind River® for a discussion of the current threat landscape and a look at 10 principles that can achieve a multiplicative effect in helping your organization protect embedded systems.

You will learn:

  • The modern threat landscape for embedded systems
  • Why it’s impossible to always keep all attackers out
  • How to protect a system that an attacker has already breached
  • 10 fundamental and essential properties of secure embedded systems

View Now

Thinking Upstream About White House Cybersecurity Order 14028

A few months ago, the U.S. White House released cybersecurity executive order 14028, an attempt by the United States government to use its purchasing power to create positive changes to the way cybersecurity is addressed around the world.

Recent high profile breaches like the Colonial Pipeline ransomware attack or the SolarWinds software supply chain attack have shown that our cybersecurity defenses are woefully inadequate. This executive order forces a higher standard of cybersecurity for any organization selling software to the federal government, which in turn makes it the de facto global standard for all software in the future.

Tidelift CEO and co-founder Donald Fischer shares his perspective on how the cybersecurity executive order impacts software supply chain security. He’ll brief attendees on the key issues addressed by the executive order, including software bill of materials (SBOM), supply chain security, and provenance requirements. He’ll outline the gaps that most organizations will need to close in order to stay in compliance. And he’ll share a proactive approach to addressing open source software supply chain health and security upstream.

If you want to ensure your organization is fully prepared for the coming changes, you won’t want to miss this briefing.

View Now

Thinking upstream about White House cybersecurity order 14028

A few months ago, the U.S. White House released cybersecurity executive order 14028, an attempt by the United States government to use its purchasing power to create positive changes to the way cybersecurity is addressed around the world.

Recent high profile breaches like the Colonial Pipeline ransomware attack or the SolarWinds software supply chain attack have shown that our cybersecurity defenses are woefully inadequate. This executive order forces a higher standard of cybersecurity for any organization selling software to the federal government, which in turn makes it the de facto global standard for all software in the future.

Tidelift CEO and co-founder Donald Fischer shares his perspective on how the cybersecurity executive order impacts software supply chain security. He’ll brief attendees on the key issues addressed by the executive order, including software bill of materials (SBOM), supply chain security, and provenance requirements. He’ll outline the gaps that most organizations will need to close in order to stay in compliance. And he’ll share a proactive approach to addressing open source software supply chain health and security upstream.

If you want to ensure your organization is fully prepared for the coming changes, you won’t want to miss this briefing.

View Now

Adding Anomaly Detection to Your Secure Access Strategy

Security analytics are a double-edged sword: while the information they provide can be vital to identify potential issues or anomalies before they become problems, the quantity of data collected and alerts generated can overwhelm even the most experienced security team. By processing all of the telemetry collected during an access attempt and setting a baseline, Duo understands whether a login is normal or deviates from established patterns. This helps administrators efficiently focus on the most likely risks and remediate them. How can we best filter the noise of routine authentications and highlight anomalous logins that may require attention? Join Cisco’s Ted Kietzman to explore anomaly detection and secure access.

View Now

Adding Anomaly Detection to Your Secure Access Strategy

Security analytics are a double-edged sword: while the information they provide can be vital to identify potential issues or anomalies before they become problems, the quantity of data collected and alerts generated can overwhelm even the most experienced security team. By processing all of the telemetry collected during an access attempt and setting a baseline, Duo understands whether a login is normal or deviates from established patterns. This helps administrators efficiently focus on the most likely risks and remediate them. How can we best filter the noise of routine authentications and highlight anomalous logins that may require attention? Join Cisco’s Ted Kietzman to explore anomaly detection and secure access.

View Now

Maximize your Microsoft 365 Investment With Collaborative Tools From Adobe

With flexible workstyles now the norm, use of Microsoft Teams and Microsoft 365 are at an all-time high. From e-signatures to document collaboration and creative tools, Adobe’s most powerful capabilities integrate natively into Teams to drive greater productivity and enhanced business growth.

In the on-demand webinar Adobe helps you get more done in Microsoft Teams, Microsoft and Adobe partner to explore maximizing your investment in Microsoft 365 by taking advantage of the full suite of Adobe productivity capabilities. Watch the webinar to see how to:

  • Collaborate on PDF documents with Adobe Acrobat
  • Add e-signatures to face-to-face meetings with Live Sign
  • Bring security and tracking to Teams Approvals with Adobe Sign
  • Access Adobe Creative Cloud files and collaborate on projects

All within Microsoft Teams.

[Speakers:]

  • Mike Ammerlaan, Director Microsoft 365 Ecosystem Marketing, Microsoft
  • Garrett Schwartz, Product Marketing Manager, Adobe
  • Ben Vanderberg, Sr. Tech Product Evangelist, Adobe

View Now