Published By: HireVue
Published Date: May 18, 2018
Recruiting and selecting talented people has become a top
HR priority. To support this priority, many organizations are
leveraging assessment tools and processes to find, hire, and
select the best candidates.
To better understand both the use and value of modern
assessments, HR.com and its partner, HireVue, launched The
State of Assessments survey. The investigation covered the
• The biggest challenges to hiring the best talent
• Primary benefits and uses of assessments
• Features that HR professionals want most from
• Most commonly used components of assessments
• Time-to-completion and completion rates associated
• The role of video interviewing in the assessment process
• Future investments in pre-hiring assessments
• And, finally, the ways that high-performing organizations tend to differ from other
organizations in terms of how they use these tools
Published By: HireVue
Published Date: Aug 28, 2018
Pre-hire assessments are a proven, scientific way to screen candidates. Today, pre-hire assessments have evolved beyond their legacy standardized-testing roots to measure a candidate’s critical competencies faster, more accurately, and in a way that enhances their candidate experience.
EXPECT TO LEARN:
Why pre-hire assessments make hiring more data-driven
The technologies driving the next generation of pre-hire assessments
How the next generation of assessments mitigate bias and control for adverse impact
How video-based and game-based assessments provide complementary insight into a candidate’s skills, abilities, and potential
Why the multiple-choice pre-employment test is becoming a thing of the past
Download the free white paper now
Published By: HireVue
Published Date: Nov 28, 2018
The holy grail of recruitment is prediction: how well you can predict a candidate’s success based on a limited number of touch points. Game-based assessments provide insight into the best predictor of job performance: a candidate’s cognitive ability.
IN THIS EBOOK, YOU’LL LEARN:
How game-based assessments increase candidate completion rates while mitigating bias
The drawbacks of legacy cognitive testing
Why measuring cognitive traits through games was impossible until recently
The types of employers who benefit most from a game-based approach to assessment
Download the free eBook now
It’s no secret: school climate is the single-biggest indicator of school performance. Translation: When students feel safe and engaged in school, they perform better. But how do you measure climate? Download our latest resource and learn the five elements every school climate initiative needs to succeed.
Published By: Seismic
Published Date: May 14, 2019
According to Aberdeen, organizations with a sales enablement initiative experience a 13.7% annual increase in deal size.
The impact of a sales enablement initiative on operational efficiency, alignment, and revenue is indisputable—and if you’re not already working on a sales enablement initiative, it’s time to seriously consider if your organization is ready to embark on this journey.
We created this checklist to help you assess your organization’s need for sales enablement. Answer these questions honestly to determine if you’re ready for a sales enablement strategy and solution.
Published By: Two Sigma
Published Date: Sep 19, 2019
In this paper, we provide an overview of the Two Sigma Factor Lens, designed for
analyzing multi-asset portfolios and derived from returns of broad, liquid asset class
proxy indexes. This lens is intended to be:
• Holistic, by capturing the large majority of cross-sectional and
time-series risk for typical institutional portfolios;
• Parsimonious, by using as few factors as possible;
• Orthogonal, with each risk factor capturing a statistically
uncorrelated risk across assets;
• Actionable, such that desired changes to factor exposure can
be readily translated into asset allocation changes.
Finally, we discuss methods for constructing and assessing the Two Sigma Factor
Lens that can be extended to produce additional risk factors for new sub-assetclasses
or cross-sectional risks that may not currently be captured by the lens.1
This factor lens, and our ongoing work to expand it, form the foundations of the
The Application Usage and Risk Report from Palo Alto Networks provides a global view into enterprise application usage by summarizing network traffic assessments conducted in 1,636 organizations worldwide.
Published By: Mimecast
Published Date: Apr 18, 2017
"To tackle today’s cyber threats, IT security leaders must rethink traditional security strategies. Email security in particular has become a victim of its own success and requires a radical rethink, having played a key role in several high-profile security breaches.
Today’s threats, like spear-phishing, are designed to bypass traditional Secure Email Gateway defenses, often taking advantage of end users who are considered the weakest link in business email security armor. A zero-trust approach to email security is needed.
This white paper discusses how:
- CISO’s should carefully assess email security as part of a strategic security review
- IT Managers can evaluate the state of current email defenses and take tactical action to strengthen them
- Security Administrators can deliver best-practice defense in depth for email
- Organizations can remove a reliance on trust to more effectively protect information, their network and employees.
Published By: Mimecast
Published Date: Aug 22, 2017
An Email Security Risk Assessment conducted this year by Mimecast re-examined more than 40 million emails that had been OK’d by various security solutions, including Office 365.
Of those, more than 19,000 were found to be “dangerous file types,” infected with malicious malware attachments or cleverly disguised impersonation attacks.
This expert white paper explores how you can close Office 365 email security gaps. Learn considerations for evaluating security services that can bolster your email security.
Published By: Mimecast
Published Date: Feb 07, 2018
Is your healthcare organization part of the 90% that conducts annual cybersecurity assessments?* Do you wonder where your IT peers are headed with their cybersecurity plans and how they prioritize their initiatives? Recent HIMSS survey results reveal these insights and more, plus the 5 steps to improve your email security’s prognosis.
This E-book contains startling facts and important cybersecurity insights every healthcare IT security leader needs to know.
*HIMSS Analytics survey conducted on behalf of Mimecast, December 2017
Good analysis and benchmarking of hotline data helps organisations answer crucial questions about their ethics and compliance programme, including:
Does our culture support employees who raise concerns?
Are our communications with employees reaching the intended audiences and having the desired effect?
Are our investigations thorough and effective?
Do we need more training?
Do we need to review or update our policies?
Do employees know about our reporting channels?
Comparing internal data year over year to help answer these questions is important. But getting a broader perspective on how your performance matches up to industry norms is critical. This year’s analysis of our EMEA & APAC data from nearly 14,000 ethics and compliance hotline reports revealed key data points that compliance professionals can use to benchmark and assess their programme’s performance, and move toward predictive risk mitigation.
With the introduction of the Foreign Corrupt Practices Act (FCPA) and UK Bribery Act, organisations must take corruption in business seriously. Given the complexity of the activities addressed in an anti-bribery and corruption programme, however, the task can seem overwhelming.
Our Anti-Bribery and Corruption Risk Assessment Checklist outlines how to implement an effective anti-bribery compliance programme using a protect, detect and correct methodology to manage core programme components such as:
• Risk Assessment
• Corrective Action
• Training / Communication
• Controls / Oversight
• Business Partners
Our checklist will enable you to design and implement an effective, global and consistent anti-bribery compliance programme.
A strong ethics and compliance programme improves organisational culture, protects corporate reputation and enhances employee engagement. When an ethics and compliance programme is lacking, an organisation could be exposed to significant risk. To ensure compliance programmes meet ongoing best practices, assessments and regular reviews are necessary, valuable and expected by numerous internal and external parties, including government agencies.
New laws and regulations, new lines of business, new geographies and mergers and acquisitions become part of a growing enterprise your compliance ecosystem must support. This requires those in charge of the system to regularly revisit and assess their risk and priorities to make necessary adjustments that ensure an effective compliance programme.
The Definitive Guide to Compliance Programme Assessment is a comprehensive resource full of advice and best practices. It is designed to help organisations evaluate and improve their ethics and complia
Learn how to effectively and efficiently manage your organisation's employee handbook, code of conduct and other important documents. This guide gives organisations of all sizes insight on how to optimize policy and procedure management with real-world examples, helpful tips, and research.
What you’ll learn:
- Best Practices on How to Plan, Implement, and Measure your programme
- Eleven Commandments of Policy Formatting and Writing
- 20 Questions for Prioritising Policy Development Efforts
- Pros & Cons of Various Distribution Methods
- Assessment Questions to Evaluate Your Current Document Management Strategy
- Build versus Buy Considerations
The Definitive Guide to Compliance Programme Assessment is a comprehensive resource full of advice and best practices. It is designed to help organisations evaluate and improve their ethics and compliance programmes through industry evidence and insights.
Each programme is unique, with disparate risks and various levels of maturity, so not everything in this guide will apply to every programme. It is designed to help you perform a robust gap analysis of your unique programme and guide you through best practices to achieve the next level of programme sophistication right for your organisation.
What you'll learn:
How internal and external parties define programme effectiveness
The eight essential components of an effective ethics and compliance programme
How to share your assessment in a meaningful way
Published By: Solidcore
Published Date: Jan 07, 2008
This IT audit checklist guide includes advice on assessing the effectiveness of change management in a variety of areas. As companies grow more dependent on interdependent IT systems, the risks associated with untested changes in development and production environments have increased proportionately.
If your company stores or processes credit card information, you must be able to demonstrate compliance with the Payment Card Industry (PCI) Data Security Standards (DSS). These standards include requirements for security management, policies, procedures, network architecture, design, and other critical protective measures. They also include one very prescriptive requirement: Section 6.6 mandates that organizations secure all Web applications by conducting a code review or installing an application layer firewall. Companies have had a very difficult time passing the other parts of Section 6 and they have experienced a rising number of data breaches. Unless companies take 6.6 seriously, PCI compliance failure rates, and data breaches, will continue to grow. Read this whitepaper to gain an overview of best practices to pass Section 6.6 and an understanding of the technology available to you.
Is open source secure? How much business risk is introduced with it? Fortify surveyed the open source community for an answer and revealed that open source projects lack the three essential elements of security: people, process and technology. Read this research to discover what actions can reduce these risks within your organization.
The hacking community has shifted its effort toward a new frontier: the application layer. How are companies responding? Business Software Assurance – the capability to address the problem of application risk within an enterprise. This whitepaper provides an overview of the severity of the problem along with everything needed to develop Business Software Assurance in your organization.
For a CISO, open source introduces a new source of risk and unique security challenge: how do you influence developers over whom you have no direct management control? Jennifer Bayuk, former CISO of Bear Stearns, provides insight on best practices for evaluating, deploying and managing open source code.
While investments to secure the enterprise continue to rise, breaches into company systems and data are skyrocketing. These cyber crimes are consistently debilitating organizations operations, reputations and ultimately, viability. Today’s CEOs are demanding aggressive strategies to protect their business. CIOs and CSOs are working together to employ proven Business Software Assurance approaches across the enterprise to stay ahead of constant threats.
DatacenterDynamics is a brand of DCD Group, a global B2B media and publishing company that develops products to help senior professionals in the world's most ICT dependent organizations make risk-based infrastructure and capacity decisions.
Our portfolio of live events, online and print publishing, business intelligence and professional development brands are centred on the complexities of technology convergence. Operating in 42 different countries, we have developed a unique global knowledge and networking platform, which is trusted by over 30,000 ICT, engineering and technology professionals.
Data Centre Dynamics Ltd.
102-108 Clifton Street
London EC2A 4HW