Recruitment Metrics to Power Your Hiring Strategies

Did you know that 71% of companies see people analytics as a high priority, but only 8% report they have usable data, according to Deloitte?

Utilitizing recruitment metrics allows you to evaluate your hiring process and ensure that you stay on track with your company’s strategies and goals.

In this pre-recorded, 45 minute webinar, we were joined by Richard Brown, Lead Talent and DE&I Business Partner at McLaren Racing, to discuss the recruitment metrics that have helped them to improve their DE&I progress.

Brown deep-dives into the following:

  • How recruitment metrics are set up at McLaren Racing
  • How these metrics impact everyday business decisions
  • Ways to recruit more intelligently using real-life examples

Learn how to use recruitment metrics to power your hiring strategies!

Image Screenshoot
View Now

How To Get Your Employer Branding Right

The best talent has plenty of options, so differentiating your organization is critical. The time to start thinking about positioning your company as a great employer is long before you ever post a job or interview a candidate.

In this pre-recorded, 45 minute webinar, we were joined by Maria Rodriguez, Global HR Director of HireRight, where we discussed:

  • How companies can maintain a strong employer brand during times of crisis and the story they should be telling
  • How recruiters and hiring managers who don’t have buy-in from management can get support for employer branding initiatives
  • How can hiring professionals ensure their employer branding is both authentic and compelling
  • The best ways to measure the success of employer branding campaigns

Learn how you can shape your employer brand so that it is both authentic and compelling to candidates and employees.

Image Screenshoot
View Now

OSS Supply Chain Security and How to Help Your Overburdened Dev Team

In this Upstream chat, Tracy Bannon from MITRE joined us to discuss why it took so long, what is happening now that will help organizations positively impact their own security preparedness, and how we can bring forward good ideas and warnings in the future.

She discussed how to talk about risk profile and ways organizations can force-rank priorities. She also discussed why it’s important to reduce cognitive load on the development teams and why it’s important to offload some tasks onto trusted vendors.

Tidelift CEO and co-founder Donald Fischer then joined the discussion and explained how all this applies to open source software specifically. Donald and Tracy discussed the recently disclosed security vulnerability in the Apache log4j project, which has been dubbed “Log4Shell”, why it’s important to address quickly, how to address it, and how to better prepare for future vulnerabilities. You won't want to miss this.

Image Screenshoot
View Now

Everything You Need to Know About the Log4Shell Vulnerability

Log4j is a popular library for logging things in Java applications. Practically every organization that uses Java (Maven/Gradle) uses Log4j and has likely been impacted by the log4shell vulnerability.

In this 20-minute briefing, Tidelift solutions architect lead Mark Galpin shares what you need to know about the recent Log4Shell vulnerability—and demos how Tidelift can help.

Mark breaks down the current situation and shares tips for remediating the issue. You won't want to miss this.

Image Screenshoot
View Now

Galileo Cloud Compass

Don't Overpay for Cloud!

KNOW BEFORE YOU GO

Galileo’s Cloud Compass will help you evaluate your servers and connected storage and compare it to the current pricing data from Azure, AWS, & IBM so you can make an intelligent cloud decision in minutes.

Cloud Compass can provide fast insight into thousands of systems and easily spot waste. (Yes, even AIX & IBM i) It consistently helps businesses of all sizes realize drastic savings on their monthly cloud bills. In this demo, you’ll see how GCC helped one customer cut $50,000 a MONTH off their cloud bill! So what kind of savings will it uncover for you? Watch the demo to find out.

INSIDE THE DEMO:

RIGHT-SIZING

Intelligently size your cloud environment based on peak workloads from your existing architecture.

PRICE ANY CLOUD

Upload user-defined pricing to show cost information for ANY cloud, including your on-prem infrastructure!



COMPARE YOUR
SAVINGS

See multiple cloud options
side-by-side with new pricing profile cards.

ANALYZE EVERYTHING

Perform in-depth cost analysis with enhanced tables that allow you to pivot, group, filter, and more.

Image Screenshoot
View Now

DevOps: Taking Your Infrastructure to the Next Level

High-performing DevOps teams state a 106x faster lead time, and a 7x lower change failure rate, than their lower-performing peers in a 2019 DORA/Google Cloud survey.

Already sold on DevOps? How well is your DevOps organization performing? What's your next step?

Join discussion on how simulation can help you level up your DevOps practices.

What you will learn:

  • How to remove bottlenecks caused by lack of hardware availability
  • Why (and how) choosing accuracy vs. speed may help you go faster
  • How nondestructive testing can save you money
  • How to test on 1 or 100 devices without doing 100x the work
Image Screenshoot
View Now

Deploying Containers in a RTOS World

Embedded development is modernizing and transforming digitally, changing forever — and for good. The Internet of Things and the advent of intelligent systems require network connectivity to collect data that can be used for monitoring and analytics. This persistent connectivity calls for constant upgrades and new capabilities as well as rapid fixes for security issues. One of the most efficient and effective ways to accomplish this is through containers.

This demonstration and discussion will touch on some of the embedded use cases where it makes sense to leverage container technology on an RTOS. We will show you how containers can empower a software developer to leverage open source, extend functionality after deployment, and adapt to changing specifications.

What you will learn:

  • Use cases for containers on both Linux and VxWorks
  • How to resource partitioning to maximize container benefits
  • How to rapidly deploy a new application for VxWorks using containers
Image Screenshoot
View Now

10 Best Practices for Secure Embedded Systems

Learn the latest threats to your embedded systems and how to protect against them — even when attackers have already struck.

The number of security flaws published last year made 2020 the fourth consecutive year to break records in the number of recorded vulnerabilities (US-CERT Vulnerability Database). We must change how we think about securing embedded systems.

Join Wind River® for a discussion of the current threat landscape and a look at 10 principles that can achieve a multiplicative effect in helping your organization protect embedded systems.

You will learn:

  • The modern threat landscape for embedded systems
  • Why it’s impossible to always keep all attackers out
  • How to protect a system that an attacker has already breached
  • 10 fundamental and essential properties of secure embedded systems
Image Screenshoot
View Now

Thinking Upstream About White House Cybersecurity Order 14028

A few months ago, the U.S. White House released cybersecurity executive order 14028, an attempt by the United States government to use its purchasing power to create positive changes to the way cybersecurity is addressed around the world.

Recent high profile breaches like the Colonial Pipeline ransomware attack or the SolarWinds software supply chain attack have shown that our cybersecurity defenses are woefully inadequate. This executive order forces a higher standard of cybersecurity for any organization selling software to the federal government, which in turn makes it the de facto global standard for all software in the future.

Tidelift CEO and co-founder Donald Fischer shares his perspective on how the cybersecurity executive order impacts software supply chain security. He’ll brief attendees on the key issues addressed by the executive order, including software bill of materials (SBOM), supply chain security, and provenance requirements. He’ll outline the gaps that most organizations will need to close in order to stay in compliance. And he’ll share a proactive approach to addressing open source software supply chain health and security upstream.

If you want to ensure your organization is fully prepared for the coming changes, you won’t want to miss this briefing.

Image Screenshoot
View Now

Thinking upstream about White House cybersecurity order 14028

A few months ago, the U.S. White House released cybersecurity executive order 14028, an attempt by the United States government to use its purchasing power to create positive changes to the way cybersecurity is addressed around the world.

Recent high profile breaches like the Colonial Pipeline ransomware attack or the SolarWinds software supply chain attack have shown that our cybersecurity defenses are woefully inadequate. This executive order forces a higher standard of cybersecurity for any organization selling software to the federal government, which in turn makes it the de facto global standard for all software in the future.

Tidelift CEO and co-founder Donald Fischer shares his perspective on how the cybersecurity executive order impacts software supply chain security. He’ll brief attendees on the key issues addressed by the executive order, including software bill of materials (SBOM), supply chain security, and provenance requirements. He’ll outline the gaps that most organizations will need to close in order to stay in compliance. And he’ll share a proactive approach to addressing open source software supply chain health and security upstream.

If you want to ensure your organization is fully prepared for the coming changes, you won’t want to miss this briefing.

Image Screenshoot
View Now

Adding Anomaly Detection to Your Secure Access Strategy

Security analytics are a double-edged sword: while the information they provide can be vital to identify potential issues or anomalies before they become problems, the quantity of data collected and alerts generated can overwhelm even the most experienced security team. By processing all of the telemetry collected during an access attempt and setting a baseline, Duo understands whether a login is normal or deviates from established patterns. This helps administrators efficiently focus on the most likely risks and remediate them. How can we best filter the noise of routine authentications and highlight anomalous logins that may require attention? Join Cisco’s Ted Kietzman to explore anomaly detection and secure access.

Image Screenshoot
View Now

Adding Anomaly Detection to Your Secure Access Strategy

Security analytics are a double-edged sword: while the information they provide can be vital to identify potential issues or anomalies before they become problems, the quantity of data collected and alerts generated can overwhelm even the most experienced security team. By processing all of the telemetry collected during an access attempt and setting a baseline, Duo understands whether a login is normal or deviates from established patterns. This helps administrators efficiently focus on the most likely risks and remediate them. How can we best filter the noise of routine authentications and highlight anomalous logins that may require attention? Join Cisco’s Ted Kietzman to explore anomaly detection and secure access.

Image Screenshoot
View Now

Maximize your Microsoft 365 Investment With Collaborative Tools From Adobe

With flexible workstyles now the norm, use of Microsoft Teams and Microsoft 365 are at an all-time high. From e-signatures to document collaboration and creative tools, Adobe’s most powerful capabilities integrate natively into Teams to drive greater productivity and enhanced business growth.

In the on-demand webinar Adobe helps you get more done in Microsoft Teams, Microsoft and Adobe partner to explore maximizing your investment in Microsoft 365 by taking advantage of the full suite of Adobe productivity capabilities. Watch the webinar to see how to:

  • Collaborate on PDF documents with Adobe Acrobat
  • Add e-signatures to face-to-face meetings with Live Sign
  • Bring security and tracking to Teams Approvals with Adobe Sign
  • Access Adobe Creative Cloud files and collaborate on projects

All within Microsoft Teams.

[Speakers:]

  • Mike Ammerlaan, Director Microsoft 365 Ecosystem Marketing, Microsoft
  • Garrett Schwartz, Product Marketing Manager, Adobe
  • Ben Vanderberg, Sr. Tech Product Evangelist, Adobe
Image Screenshoot
View Now

3 Steps to Reduce Risk in Your Cloud Environment(s)

Ensure Security in the Cloud

As the cloud becomes foggier and even edge environments begin to resemble traditional cloud, it becomes increasingly difficult to maintain a posture that reduces an organization's risk. With technology strewn across disparate environments, the attack surface area for your network expands rather dramatically.

How confident are you that your security strategy is doing that - without sacrificing agility?

Watch, 3 Steps to Reduce Risk in Your Cloud Environment(s), to learn how to:

  • Improve your overall security posture
  • Eliminate misconfigurations that can increase your attack surface
  • Articulate your risk reduction strategy to senior management
Image Screenshoot
View Now

Light in the Dark: Hunting for SUNBURST

This past winter, FireEye uncovered a widespread campaign conducted by a threat group we labeled UNC2452. This group used SolarWinds’ Orion Platform to launch a supply chain attack and deploy a backdoor called SUNBURST that affected organizations around the globe.

Mandiant Managed Defense was hunting down the threat and identifying potential victims before the attack had a name.

In this on-demand webinar, Mandiant’s Matt Bromiley and Andrew Rector share an inside look at how Mandiant addressed the SUNBURST threat with clients. You’ll hear frontline stories, and:

  • See how this attack influences the way we view cyber security
  • Learn SUNBURST threat actors TTPs
  • Discover the techniques used by Mandiant threat hunters
Image Screenshoot
View Now