WatchIT

WatchIT >

114
Videos

Business Intelligence Collection

IT Project Management Collection

Security & Risk Management Collection

SmartPros Auditing Collection

SmartPros Taxes Collection

SmartPros Management and Advisory Collection

Loading more films...

114 Videos in WatchIT

Loading...
Social Media - What You Don’t Know Can Hurt You
As postings on social media have routinely replaced conversations over lunch or around the water cooler, workers have filed almost 100 social media-related complaints against employers with the National Labor Relations Board. Mich'l Schmidt, a partner at Cozen O'Connor P.C.,…
Big Data in the Enterprise: An Introduction
Part of the Series: Business Intelligence Collection
IT professionals around the globe are now being challenged to manage, organize and analyze these vast data sets strategically; to identify new business trends, conduct highly-advanced product research and even predict threats to enterprise security. This report will introduce and…
Introducing IoT: The Internet of Things - An Explanation of IoT
In this report we'll take a close-up look at the "Internet of Things," also known as IoT. We'll talk about the associated technologies, legal, security and privacy issues. In addition, we'll discuss what the future may hold for our growing…
Technology Economics: A Driving Force Behind Business Today
Part of the Series: IT Project Management Collection
Combined technology spending in today's global economy now tops $4.2 trillion dollars, a number larger than the gross domestic product of most nations. This rising global "Technology Economy" is most certainly a driving force in business today. In this program,…
Real World Corporate Governance - From CEO to Whistleblower
Part of the Series: WatchIT Management and Advisory Collection
Course Overview Historically, whistleblowers are rarely rewarded for their efforts. Our cameras were on hand for the keynote address at FEI's Current Financial Reporting Issues conference, as Mich'l Woodford, the former president of the Olympus Corporation, recounted his painful journey…
Emerging IT Trends - And Their Impact on Security Policies
Over the past decade, we have witnessed a true paradigm shift in global computing. This technological revolution has been led by familiar players such as the Internet, wireless communication and Cloud Computing and is complimented by a host of clever…
A New Challenge: Global Supply Chain Risk Management
Part of the Series: WatchIT Economics and Finance Collection
Course Overview With their supply chain expanding to include a web of third-party service providers managing mission-critical business functions and operations, many companies have assumed that their exposure to uncertainty has also increased. Management expert Gary Lynch reveals how you…
How Do You Prevent and Detect Financial Fraud
Part of the Series: WatchIT Management and Advisory Collection
Course Overview The good news is that the economy is painfully emerging from the recession and financial crisis. The bad news is that, during times of economic upturn, the pressure for spectacular financial results returns. Attorney Mich'l R. Young, author…
Cloud Computing: Trends, Strategies and Best Practices
Part of the Series: WatchIT Computer Science Collection
This course features a recognized Cloud Computing and SOA expert. The course material covers the evolution of Cloud Computing, common misconceptions, effective Cloud Computing strategies, risks and benefits related to the Cloud, enabling capabilities of the Cloud related to modern…
Enterprise Security Landscape: Risks and Controls
Part of the Series: WatchIT Auditing Collection
Course Overview As our society grows increasingly interconnected through the Internet and a myriad of wired and wireless devices, managing the security of critical company information becomes more and more of a challenge. In our final segment, Jack Danahy, Director…
Social Media for Business: What You Need to Know
Public and private sector organizations must tread carefully with social networks or risk the possibility of legal entanglements, loss of business, and perhaps worst of all, unhappy customers. In this report, expert and attorney Peter Vogel, discusses the key areas…
Social Networking - Does it Work at Work?
Not all that long ago, CIOs and IT managers were listening to the grumblings of many of their business colleagues who wanted to shut down or ban employee access to popular social networking sites such as Facebook, Linkedin and Twitter.…
Eradicating Emotional Blind Spots in Technology Projects - Personal Barriers in Technology
This course discusses the impact of emotional blind spots in technology projects. The Cambridge Dictionary offers us two definitions of the word blind spot. The first being, "an area that you are not able to see, especially the part of…
Introduction To IT Controls for Technologists
Part of the Series: WatchIT Computer Science Collection
This course describes the importance of IT controls and their potential benefits to the technology staff. Major topics include what controls are, why they are needed, applying controls to IT, building a control framework, and discussing critical IT control areas.…
Effective Data Management
Part of the Series: Data & Storage Management Collection
How much data do we create every day? Well, experts estimate that a massive 2.5 quintillion bytes of data is amassed on a daily basis and that 90% of the world's global data glut is the product of only the…
The Role of Technology in Counter-Terrorism
Part of the Series: Security & Risk Management Collection
Through the tragedy of 9/11, the Boston Marathon bombings and the recent NSA surveillance controversy, we have become aware of the critical nature of technology in the detection and investigation of terrorist threats and actions today. From biometrics and communication…
Enterprise Security Landscape
Part of the Series: Security & Risk Management Collection
Hackers around the globe are relentless in their attempts to access networks and devices in order to steal information or plant malicious programs. IT security professionals are in a constant tug-of-war with these actors defending enterprise systems and data from…
Application Security Principles
Businesses depend on robust, reliable, and secure software to ensure their continued operation. But with a lot of software, security is cobbled on as an afterthought. According to consultant Ted Demopoulos, security needs to be part of the system design,…
Cyber Attacks and Security Breaches: Coping with External Threats
Part of the Series: Security & Risk Management Collection
On any given day, IT and security professionals worldwide must be on-guard and ready to defend their enterprise networks, core data and intellectual property from external threats and attacks. From hacktivist groups like, Anonymous, to criminal organizations and state sponsored…
Principles of Cloud Computing - Perspectives on Business, Technology & Cost
This course, the first of a 3-part series, lays out the foundation and key principles of cloud computing. The initial section presents the variable cost business model, which some believe may be the greatest contribution that cloud computing is going…