Webinars

Events & Webinars

Past from our webinars

Our past event schedules were more than just timelines; they were the intricate roadmap to unforgettable experiences,blending entertainment, knowledge, and community spirit.

11:00 - 12:00
SMaaS 2024-02

At SPS, Inc., we recognize the critical importance of security for organizations across the board. Our team is equipped to assist you in assessing your current security standing. Discover more by participating in our upcoming webinar scheduled for February 8th, 2024, at 11:00 am ET, where we will delve into the details of our Security Management as a Service (SMaaS).

Why Participate?
Tailored for organizations of all sizes, our webinar aims to attract those seeking to evaluate and enhance their existing security postures.

Keynote Speakers:

Rainer Barthel, Director SMaaS (Over 25 years of Cyber Security expertise and former CIO)
Nouman Abbasi, Vice President of Cybersecurity (Over 25 years of Cyber Security expertise)

Highlights of SMaaS:

Our SMaaS offering is designed to empower your organization through comprehensive security management, including:

  • Organizational Assessment with NIST Cybersecurity Framework including completing a cybersecurity checklist
  • Attack Surface Assessment
  • Network Assessment
  • Privileged Accounts Review
  • AD Security Review
  • Data Discovery Assessment
  • Threat Simulation
  • Incident Response Assessment and Recommendations
  • Business Continuity and Disaster Recovery Evaluation

With SMaaS, proactively identify vulnerabilities, strengthen defenses, and ensure business continuity in the face of unforeseen disruptions.

Event Details:
Date: February 8th, 2024
Time: 11:00 am EST       
Duration: Approximately 1 hour

img
Rainer Barthel

Director SMaaS

16:00 - 17:00
Technical Training Courses in Oil & Gas

img
Dr. Qamar J. Sharif

Executive VP, SPS, Inc., Oil & Gas.

16:00 - 17:00
Technical Training Courses in Oil & Gas

img
Dr. Qamar J. Sharif

Executive VP, SPS, Inc., Oil & Gas.

14:00 - 15:00
Securing your offshore Oil and Gas Infrastructure

Offshore oil and gas infrastructure faces significant and increasing cybersecurity risks in the form of threat actors, vulnerabilities, and potential impacts.

Threat actors. State actors, cybercriminals, and others could potentially conduct cyberattacks against offshore oil and gas infrastructure. The federal government has identified the oil and gas sector as a target of malicious state actors.

Vulnerabilities. Modern exploration and production methods are increasingly reliant on remotely connected operational technology—often critical to safety— that is vulnerable to cyberattack. Older infrastructure is also vulnerable because its operational technology can have fewer cybersecurity protection measures.

Potential impacts. A successful cyberattack on offshore oil and gas infrastructure could cause physical, environmental, and economic harm, according federal officials. For example, officials said that the effects of a cyberattack could resemble those that occurred in the 2010 Deepwater Horizon disaster. Disruptions to oil and gas production or transmission could also affect energy supplies and markets.

img
Sarah Pixley

Cybersecurity Solutions, IBM

13:00 - 14:00
Empower Users, Enhance Security. A Game-Changing Webinar for IBM QRadar Customers

Join us for an enlightening webinar as we unveil the groundbreaking integration of MYID and IBM QRadar, designed to transform your security operations center (SOC) into a self-service powerhouse. Whether you are an existing or prospective IBM QRadar customer, this webinar is your gateway to revolutionizing your security landscape.

Discover how MYID empowers both existing and new IBM QRadar customers to unleash the true potential of their security operations centers. With MYID's seamless integration, every user in your organization can become an active participant in your SOC. Witness firsthand how self-service capabilities enable users to take control of their security posture.

During this webinar, we will demonstrate how MYID empowers users to review and respond to security incidents independently. Explore how real-time feeds from IBM QRadar trigger personalized push notifications to end users, ensuring they are promptly informed if their identity is involved in an offense. Users can then take immediate action by simply confirming or denying their involvement.

But that's not all—MYID takes security a step further. In cases where users deny involvement, access termination is initiated, forcing them to change their password for enhanced protection. Once the password is changed, normal operations are restored seamlessly, ensuring the highest level of security without compromising user experience.

Don't miss this opportunity to unlock the power of a self-service SOC with MYID and IBM QRadar. Join us and learn how to transform your security operations, streamline incident response, and empower every user in your organization. Register now to embark on a new era of security operations.

img
Nouman Abbasi

Sr VP, Cybersecurity

14:00 - 15:00
Elevate Your Security with SMaaS

 At SPS, Inc., we understand that security is paramount for organizations of all sizes, and we are excited to invite you to our upcoming webinar on October 10th, 2023, where we will share with you our Security Management as a Service (SMaaS) offering.

Why Attend?
Our webinar is tailored to attract organizations, whether small, medium, or large that are looking to enhance their existing security profiles. We have an exciting lineup of speakers who will shed light on the transformative power of SMaaS:
One of our speakers - a Director of IT and Security, will share his firsthand experience of dealing with ransomware attacks not once, but twice, and how he successfully leveraged our SMaaS to establish a robust security program within his healthcare/retail organization. His story includes insights on qualifying for cyber insurance, a critical aspect of modern security.
Jay Kozireski, Director of Sales, and Nouman Abbasi, Vice President of Cybersecurity: These industry experts will discuss the tangible business value that SMaaS brings to organizations by elevating their security management. You'll gain valuable insights into how SMaaS aligns with your business objectives and empowers you to safeguard your digital assets effectively.

Key Highlights of SMaaS:
Our SMaaS offering is designed to empower your organization by providing comprehensive security management:

  • Organizational Assessment with NIST Cybersecurity Framework
  • Attack Surface Assessment
  • Network Assessment
  • Privileged Accounts Review
  • Data Discovery Assessment
  • Threat Simulation
  • Incident Response Assessment and Recommendations
  • Business Continuity and Disaster Recovery Evaluation

With SMaaS, you can proactively identify vulnerabilities, fortify your defenses, and ensure business continuity even in the face of unforeseen disruptions.
Event Details:
Date: October 10th, 2023
Time: 2 pm EST
Duration: 1 hr. (approx.)

Don't miss out on this unique opportunity to elevate your organization's security posture. Click the link below to secure your spot:
https://us02web.zoom.us/webinar/register/WN_6b8f4nZJQW2qAI81GkF04Q


Join us on October 10th, and together, we'll embark on a journey to secure your digital future with SMaaS. If you require further information, please visit https://smaas.spsnet.com/.

We look forward to having you at our webinar!
Warm regards,

Jay Kozireski
Director of Business Development
Software Productivity Strategists, Inc. 
jay.kozireski@spsnet.com
443-562-2742

img
Nouman Abbasi

VP

17:00 - 19:00
SurgeonsEye - An Introduction

We are excited to extend a special invitation to you for our upcoming webinar that is set to redefine the landscape of surgical education.

With the challenges being faced by surgeons in teaching hospitals, we bring an innovative approach to view the surgical procedures from a different lens - a transformation of sharing and teaching.

img
Dr Nusrat Raza

ENT Specialist

11:00 - 00:00
Protect & Recover AD - ENTRA ID - THE KEYS TO THE KINGDOM

Rob Ingenthron, Senior Solution Architect at Semperis, led a compelling webinar on the pivotal role of Active Directory (AD) protection and recovery in Identity Threat Detection and Response (ITDR). Attendees gained insights into integrating AD safeguards within their ITDR strategies, emphasizing proactive measures for cyber threats. The session highlighted crucial AD attack scenarios and offered practical methods for automating protection and recovery processes, expediting operational resilience. Participants explored effective strategies, emphasizing the need for a comprehensive approach to AD security. Post-event resources, including slides and recordings, will be available for continued learning. The networking opportunities facilitated valuable collaborations, fostering a collective commitment to fortifying our digital landscapes. Thank you to Rob Ingenthron and the engaged attendees for contributing to a knowledge-rich event

img
Rainer Barthel

Director Security Management as a Service

16:00 - 17:00
New Product Development Seminar

About

New Product Development is undergoing rapid changes whereby the traditional methodologies are becoming outdated. Developing New Products and successfully bringing them to market is becoming increasingly important in this century. Most of the new wealth being generated is the result of innovation.

This seminar will contain a series of lectures aimed at educating about all aspects of New Product Development based on the world class product development experience in high tech companies and research labs.

Our Focus

The seminar will focus on the three phases of product development.

  • Activities that happen well before the decision to develop is made.
  • Activities that happen during the development of the product.
  • Activities that happen after the product has been developed.

The seminars will focus on these phases from the point of views of technology, productization, and legal aspects.

img
Imran H. Khan

President SoftServ Intl. Corp

15:00 - 16:00
Why upgrade IBM QRadar to Cloud Pak for Security?

As a QRadar client, you now have the possibility to upgrade to IBM Cloud Pak for Security and improve the overall security defenses.

Why shift towards Cloud Pak for Security now?
72% of all midmarket companies, with 2,500 or fewer employees, spend at least 50 employee-hours per week chasing down alerts, according to this IDC study.

Whether you lead a security team or dig deep into investigations as an analyst, Cloud Pak for Security can help you respond faster to security incidents, orchestrate and automate your security response, prioritize your team's time.

Take advantage of:

  • Increased efficiency and ability to make faster more informed risk-based decisions. 
  • Insights from various data sources, without needing to move that data.
  • Unified hybrid multi-cloud security view and management.
  • Future-proof new investments in cloud native security tools by knowing the platform can work with any other tool.

img
Nouman Abbasi

VP, Cyber Security Architect

15:00 - 16:00
Machine Learning approach to ATM Cash Replenishment forecasting

The global Artificial Intelligence (AI) in healthcare market size is expected to grow from USD 4.9 billion in 2020 and reach USD 45.2 billion by 2026; it is projected to grow at a compound annual growth rate (CAGR) of 44.9% during the forecast period. The machine learning technology is expected to hold the major share of the AI in healthcare market in 2021.

Agenda

  • Opening Remarks – Dr. Arshad Ali - 10 Min
  • Machine Learning approach to ATM Cash Replenishment
    forecasting – Muhammad Rafi - 30 Min
  • General Discussion – 20 Min

img
Muhammad Rafi

Associate Professor

16:00 - 17:00
Securing SAP

Join the Webinar to Learn:

  • SAP Landscape
  • SAP Security Scenarios
  • Cost of Securing SAP
  • Securing SAP with GRC
  • GRC Implementation Steps

img
John Saleem

SAP Security Practice Lead - SPS

16:00 - 17:00
ATM Security, Safer Payments and Fraud Analytics

Fraud finds its way into all payment channels — new and old. Protecting all the payment channels with contextual machine learning and AI that intuitively classifies legitimate and fraudulent financial transactions while recognizing the individual consumer behavior preferences for a convenient and secure experience.

ATM, one of the ADC payment channels is prone to security and fraud risks. The global ATM Market is projected to reach $30.50 billion by 2027, growing at a CAGR of 5.2% from 2020 to 2027. An automated teller machine(ATM) is an electronic banking outlet that allows customers to access all basic transactions of bank such as deposits, withdrawals, view account balance, transfer balance between accounts, and clear check at ATM without the aid of branch representative or teller.   

In the webinar we will share about the security and fraud risks to ATM channel, ATM security assessment services and the Detection and Prevention of fraud.

img
Hashim Barraq

Practice Manager Fraud Analytics

14:00:00 - 15:00:00
Breach Reality

We all hear the words – “It’s not a question of ‘if’… it’s a question of ‘when’…”

We get that, and we all try to prepare as effectively as we can…

But unfortunately, most Security Officers are still stunned when they face Breach Reality - the totality of events that follow a serious security breach in real time.

Our cybersecurity webinar series, “The Security Blueprint,” takes a different approach to security and shares first-hand perspectives from security leaders in the industry.  Our goal is to prepare you for the realities you may face, and the pitfalls to avoid.

In our first episode, “Breach Reality,” you'll hear the words and live through the experience of our featured Subject Matter Expert – Fran Malloy. In his role as The Director of IT Operations, Support, and Risk Management for an industry-leading outdoor apparel retailer, Fran had implemented the best present-day cybersecurity practices across his enterprise. But they still got in. On paper, he was prepared. But in reality, these were new and dangerously uncharted waters. Managing his company through an actual breach has given him many new and potentially game-changing perspectives. Hear the account and the first-hand lessons learned. 

The Security Blueprint Webinar Series will include the following episodes:

  • Ep.1 - Fran Malloy’s Breach Reality, a Case Study – Thursday, June 16, 2022, at 2 pm ET
  • Ep.2 - Privileged Identity Management
  • Ep.3 - Data Protection
  • Ep.4 – Incident Detection & Response

img
Fran Malloy

Principal Security Leader at IBM

07:00 - 08:00
Electric Grid Security (Why and How) - Module 1

img
Imran ur Rehman

Senior Consultant and Power Industry Leader

07:00:00 - 08:00:00
Creating a Security Policy - Module 2

img
Imran ur Rehman

Senior Consultant and Power Industry Leader

14:00:00 - 15:00:00
The Security Blueprint Series, Ep. 2 - Incident Response

Register Now: https://us02web.zoom.us/webinar/register/WN_pcRRQLu7TbiMQKA17sjSrw 

img
Meg West

Incident Response Consultant at IBM XForce

02:00 - 03:00
Securing SAP

SAP Security is a means to protect your company's data and systems by monitoring and controlling access both internally and externally. SAP Systems are widely used by all kinds of businesses across a variety of industries and its critical to secure you information and information systems.

We are pleased to announce our next Webinar on our SAP GRC Security Project Services and Solutions.

img
John Khalid Saleem

SAP Security Practice Leader at SPS

06:00 - 07:00
Oil Well Monitoring - Industry FYP Opportunity

SPS is proposing a project for final year students / faculty interested in Oil and Gas Industry. Scope of the project will be discussed in the webinar.

Monitoring of Oil & Gas wells production rates

 

Measure flow rate at a well. Flow of oil, gas and water separately. The flow rate could be in gallons per minute. We can measure the temperature and pressure as well. The flow rate measurement will translate into production rate measurements.

The data will be transmitted and displayed on a smart phone. Data Security must be insured.

Measurement of flow rates from a well will be up-scaled to a field level (multiple wells).

There are three possible scenarios:

  1. The well is at a remote location with no electricity and no wifi.
  2. The well location has electricity but no wifi.
  3. The well location has electricity and wifi

 

img
Dr. Qamar J. Sharif

Director SPS Oil & Gas Business

07:00 - 08:30
CyberSecurity Challenges in Industrial Sector and Discovery of OT Assets

OT security is widely used to protect Industrial Systems and networks from cyberattacks. It protects and controls critical infrastructures such as power stations, transportation networks, manufacturing facilities and smart city appliances. Though, to secure this infrastructure. you need to effectively discover it first.

Effective OT Asset Discovery service enhances visibility of your critical industrial assets without interruptions to your production processes. Comprehensive mapping of OT devices and networks allows you to identify anomalies or suspicious activities and mitigate risk to your operations.

Software Productivity Strategists Inc. is pleased to bring you the OT Security Webinar in collaboration with Tenable, the Exposure Management Company. This webinar session shall help you take the right start and identify your OT Assets to effectively protect them.

Today, more than 40,000 organizations around the world rely on Tenable to help them understand and reduce cybersecurity risk across their attack surface in the cloud or on-premises, from IT to OT and beyond. Tenable can help you gain comprehensive visibility into your attack surface so you can stay one step ahead of attackers.

img
Dominic Storey

Principal Security Engineer at Tenable

08:00 - 09:00
Educational Robotics Kit - Industry FYP Opportunity

The webinar will describe the plan of educating students how to develop Globally Competitive New Products. We will use case an educational robotic kit for high school students.

img
Imran Khan

President, SoftServ International Corp.

06:00 - 07:00
SAP Hands On: Reviewing & Resolving SOD conflicts

Governance Risk and Compliance (GRC) in SAP is critical for real-time visibility, continuous control monitoring, and predictive analytics to inform business operations and planning. This action helps in decision making and continuous process automation.

We are pleased to announce our next Webinar on our SAP GRC Security Project Services and Solutions. In this webinar, we shall present hands-on session with below agenda:

  • Present a hands-on session with actual SAP user data.
  • Review & resolution of SOD conflicts using SPS’s tool set
  • Discuss the Global SOD matrix that is the basis of GRC rulebook
  • Q&A session on SAP security related issues

 

About the SAP GRC Practice and Solution by SPS

Software Productivity Strategists Inc. (SPS) offers SAP GRC and Security Consultancy Services to help SAP customer ensure visibility and control to ensure the investment are yielding right results. SPS has its own SAP GRC and Security tool set that offers these services with quality, efficiency, and cost effectiveness.

img
John Khalid Saleem

SAP Security Practice Leader at SPS

14:00:00 - 15:00:00
The Security Blueprint Series, Ep. 2 - Incident Response

Register Now: https://us02web.zoom.us/webinar/register/WN_pcRRQLu7TbiMQKA17sjSrw 

img
Meg West

Incident Response Consultant at IBM XForce