Category Archives: Business

AuraPortal to Participate as Platinum Partner at the National Conference in Bucharest

The conference, held on October 9 in Bucharest, Romania, will feature the most renowned representatives of the BPM community worldwide, including the IT research analysts from Gartner who will engage in talks, tutorials and scientific discussions.

Woburn, MA, November 09, 2014 – AURA (www.auraportal.com), a global provider of AuraPortal Business Process Management (BPM) software, has announced its participation in the BPM Eastern Europe Conference in Bucharest. This event, held annually, covers all aspects of BPM, including theory, models, techniques, architectures, systems and empirical studies.

AuraPortal has been distinguished with great advantage over its competitors by Ovum in its Decision Matrix report and by other renowned analyst firms.

Cristobal Toro, AuraPortal Executive Manager for Eastern Europe will actively participate in the training workshops, solution provider (real-life case studies), Success Stories (end-users and providers) and face-to-face consultation meetings in order to present the best about the Business Process Management concepts and about the technology that it supports.

Moreover, AuraPortal will sponsor the practical workshop about BPM conducted by ABPMP Romania (Association of Business Process Management Professionals) of which Cristobal Toro holds the rank of Vice President.

ABOUT AURA (http://www.auraportal.com)
AURA is a global BPM (Business Process Management) software provider delivering a solution that creates, without the need of IT programming, Business Process Workflow Execution Models. AuraPortal is 100% Web-based, and is complementary to existing ERP and CRM systems.

AURA has a presence in 40 countries with more than 300 customers including, among others: Walmart, Toyota, General Motors, Pemex (Petroleos Mexicanos), Carrefour, ArcelorMittal, PepsiCo, Coca-Cola, Danone, INCAE, Kimberly-Clark, Yamaha, Royal KPN, Bristol-Myers Squibb, etc., as well as many Government Agencies and Departments in several countries. All of these customers benefit from maintenance contracts.

It is headquartered in Europe and has an executive branch in North America (Florida). It also has offices in several countries and a vast network of partners who locally attend customers throughout the world.

Press Release Distributed by Straight Line PR (http://www.Straightlinepr.com)

Contact:
Cristina Siscar
Auraportal
400 Trade Center
Woburn, MA 01801-7472
978-808-6340
pr@straightlinepr.com
http://www.auraportal.com

T5 Data Centers™ and Carpathia Forge Alliance to Deliver Custom IT Infrastructure and Cloud Solutions

New Alliance Combines T5’s Wholesale Data Centers with Cloud Services and Managed Hosting to Deliver Reliable, Versatile, Compliant Computing Environments.

Atlanta, GA, USA (November 4, 2014) — T5 Data Centers™ (http://www.t5datacenters.com), innovators in providing state-of-the-art, customizable and highly reliable computing support environments for any enterprise, today announced a new alliance with Carpathia (http://www.carpathia.com), a trusted cloud operator and leading provider of compliance services and managed hosting, to deliver cloud, managed hosting, and colocation services for enterprises and federal agencies.

Under the terms of the new alliance, Carpathia will be responsible for providing 24×365 On-Site Technical support to T5 in their purpose-built, enterprise-grade data center facility locations. T5’s Data Centers are enterprise-grade, server-ready facilities delivering secure, reliable, redundant data center and power capacity to maintain critical systems uptime. T5 will offer its customers on-site support, including incident response, hardware troubleshooting and repair, visual verification inspections, and audit preparation, delivered by Carpathia’s professionally trained team. Carpathia will offer its fully managed data center services, including private, hybrid, and community cloud solutions.

“More of our customers are coming to us looking for a full suite of IT services and cloud solutions in combination with the robust design and reliable operations of T5’s data centers,” said Craig McKesson, EVP T5 Enterprise Solutions for T5 Data Centers. “By partnering with Carpathia, we can now meet any customer’s data infrastructure needs, whether it’s building out a new data center from the ground-up, or providing an enterprise-ready approach that combines T5’s physical infrastructure with Carpathia’s cloud and managed hosting expertise. It’s the ideal way to future-proof any organization’s data center needs in a rapidly changing market.”

Initial marketing and sales strategies will target enterprise customers in digital media, healthcare, financial services, and government sectors; markets where both T5 and Carpathia already have a strong presence. Working together, the two companies will be able to provide the secure, redundant services needed to comply with regulatory standards such as HIPAA (Health Insurance Portability and Accountability Act), FISMA (Federal Information Security Management Act), and DIACAP (DoD Information Assurance Certification and Accreditation Program).

“Carpathia is pleased to have been selected by T5 to enable them to expand their offerings to include on-site technical services.” said Philip Hedlund, Vice President, Business Operations for Carpathia. “By Combining Carpathia’s deep, proven experience in enterprise IT management and cloud operations with T5’s state-of-the-art data center infrastructure, together can meet the needs of any business or mission.”

T5 offers customizable or server-ready turnkey, single or multi-tenant colocation data centers strategically located throughout the United States. Carpathia is a trusted provider of cloud services and managed hosting for secure, reliable, compliant IT infrastructures.

About T5 Data Centers

T5 Data Centers (T5) is a leading national data center owner and operator, committed to delivering customizable, scalable data centers that provide an “always on” computing environment to power mission critical business applications. T5 Data Centers provides enterprise and wholesale colocation data center services to organizations across North America using proven, best-in-class technology and techniques to design and develop facilities that deliver the lowest possible total cost of operations for its clients. T5 currently has business-critical data center facilities in Atlanta, Los Angeles, Dallas, and Charlotte with new projects announced in Portland, New York, and Colorado. All of T5’s data center projects are purpose-built facilities featuring robust design, redundant and reliable power and telecommunications and have 24-hour staff to support mission-critical computing applications.

For more information, visit http://www.t5datacenters.com.

About Carpathia

Carpathia is a trusted cloud operator and leading provider of cloud services and managed hosting, providing secure, reliable and compliant IT infrastructure and management for some of the world’s most demanding enterprises and federal agencies. Carpathia’s cloud platform delivers solutions for every stage of the cloud journey, empowering organizations to meet their unique security and compliance requirements. Carpathia’s experienced customer care team and innovative data center facilities provide 24×7 global support to ensure optimum performance and reliability. Backed by its E3 Promise™, Carpathia consistently delivers an experience that exceeds expectations.

Contact Carpathia at 1.888.200.9494, or visit http://www.carpathia.com for more information.

Media Contacts:
Aaron Wangenheim for T5 Data Centers
(415) 292-7700
aaron@t5datacenters.com

Melissa Chadwick for Carpathia
(571) 383-8513
chadwick@merritgrp.com

How the Cybersecurity Framework Helps your Company at Cyber Security World Conference 2014 New York

Building off of the momentum of past successful conferences, Golden Networking brings Cyber Security World Conference 2014 New York City (http://www.CyberSecurityWorldConference.com), forum that will bring the latest thinking from security experts to hundreds of senior executives focused on protecting enterprises’ information assets.

New York City, NY, USA (November 4, 2014) — A chain is only as strong as its weakest link, says Bill Buchanan, The Conversation. Computer security relies on a great number of links, hardware, software and something else altogether: you. The greatest threat to information security is actually people. Why strive to defeat encrypted passwords stored in computers, when those computers’ human users will turn them over willingly?

A huge problem with most types of digital communications, processing and storage is that it’s often very difficult to differentiate between a true communication and one which has been falsified. This stems largely from the internet’s background as an open, insecure system. In emails apparently from legitimate websites, the email address of the sender can be spoofed, that is, replaced with another that is not the sender’s actual address, as some email relay systems allow this.

Corporations are today targeted as never before, with growth in hacking attacks linked to nation states and overseas governments; in fact, sophisticated and sustained campaigns of phishing have succeeded in stealing information from firms and organizations all over the world. Symantec recorded a 62% rise in data breaches from spear phishing in 2013.

In response to the growing cyber threat, the Cybersecurity Framework, which was drafted by the Commerce Department’s National Institute of Standards and Technology (NIST), represents a tipping point in the evolution of cybersecurity, one in which the balance is shifting to proactive risk-management standards. While its application is voluntary, organizations across industries may gain significant benefits by adopting the guidelines.

Golden Networking’s Cyber Security World Conference 2014 New York City (http://www.CyberSecurityWorldConference.com) will provide a platform for hundreds of senior executives focused on protecting today’s enterprises to learn more about the Cybersecurity Framework and how to apply it to their organization. Topics that Cyber Security World Conference 2014 will discuss include:

• Cyber Security Megatrends Security Professionals can’t Ignore Today
• Designing and Managing Effective Information Security Programs
• Is Biometrics the Key to Personal and Corporate Security?
• How Hackers Really Operate to Obtain Financial Data
• Key Considerations about Security in the Internet of Things Age
• Strengthening the Security of Industry-wide Technology Infrastructure
• Cyber Security and its Role in the Overall Security of the United States

About Cyber Security World Conference 2014
Cyber security is never again a term to ignore for individuals or corporations. The daily activities of all Americans, the country’s global economic prominence and worldwide security rely on a safe and resilient cyberspace. Unfortunately, the number of cyber-attacks has increased dramatically over the last years, exposing confidential personal and business data, disrupting critical operations, and imposing exorbitantly high costs on the economy overall.

Just recently, J.P. Morgan Chase, America’s largest commercial bank with $2.39 trillion in assets, announced that about 76 million households and 7 million of small-business customers had been affected by a cyber attack in one of the most sweeping known global breaches. The company said the unknown attackers stole customers’ contact information, which included names, email addresses, numbers and addresses, affected an amount equivalent to almost two-thirds of American households.

A brief walk down memory lane of some the biggest recent cyber-attacks now include Adobe Systems, Automated Data Processing, Citigroup, E*Trade Financial, Fidelity Investments, Home Depot, HSBC, Nasdaq OMX, Neiman Marcus, Target and Wal-mart. It is not unlikely to consider that the information of every American has already been compromised in any of these publicly disclosed attacks.

Renowned information security experts and innovative service providers will present at Cyber Security World Conference 2014 their latest thinking to hundreds of senior executives focused on protecting enterprises and governmental agencies.

Cyber Security World Conference 2014 is produced by Golden Networking, the premier networking community for business and technology executives, entrepreneurs and investors. Panelists, speakers and sponsors are invited to contact Golden Networking by sending an email to information@goldennetworking.com.

Media Contact:
Julia Petrova
Media Relations Coordinator
Golden Networking
+1-414-FORUMS0
jpetrova@goldennetworking.com
http://www.goldennetworking.com

Cyber Security World Conference 2014 to Build on Obama’s Cyber Threat Information Sharing Framework Against Global Hacker Attacks

Building off of the momentum of past successful conferences, Golden Networking presents Cyber Security World Conference 2014 New York City (www.CyberSecurityWorldConference.com), forum that will bring the latest thinking from security experts to hundreds of senior executives focused on protecting enterprises and government’s information assets.

New York City, NY, USA (November 1, 2014) — According to The Hill, the Obama administration’s recently issued cyber threat information sharing framework comes at a time when discussions are heating up in Congress on stalled legislation dealing with cyber security. Why lawmakers and law enforcement officials have been pounding the pavement in recent weeks, declaring that steps to ease the sharing of information about cyber threats are critical for the country’s defenses, will be discussed at Golden Networking’s Cyber Security World Conference 2014 New York City (http://www.CyberSecurityWorldConference.com), unique professional gathering where cybersecurity experts are set to illustrate business on protecting their information from cyber-attacks.

The document fills a gap in the U.S. Department of Commerce’s National Institute of Standards and Technology (NIST)’s more general cybersecurity framework, released on February 12, 2014. The framework, created through collaboration between industry and government, consists of standards, guidelines, and practices to promote the protection of critical infrastructure. The prioritized, flexible, repeatable, and cost-effective approach of the framework helps owners and operators of critical infrastructure to manage cybersecurity-related risk.

The Department of Homeland Security’s Critical Infrastructure Cyber Community C³ Voluntary Program helps align critical infrastructure owners and operators with existing resources that will assist their efforts to adopt the Cybersecurity Framework and manage their cyber risks. NIST also issued a companion roadmap that discusses NIST’s next steps with the Framework and identifies key areas of cybersecurity development, alignment, and collaboration.

Roadblocks to total implementation still remain though, as both industry and privacy groups have been hesitant to freely share information in the current legal landscape. One bill that would address the legal issues is the Cybersecurity Information Sharing Act (CISA), but it remains unclear whether the bill could see action in the lame-duck session after the elections, according to The Hill. Absent congressional action, businesses are concerned about whether they will be protected from liability when sharing information with the government. Conversely, privacy advocates are wary of what personal data industries might share with the government, given the surveillance activities that have been revealed at the National Security Agency (NSA).

About Cyber Security World Conference 2014

Cybersecurity is never again a term to ignore for individuals or corporations. The daily activities of all Americans, the country’s global economic prominence and worldwide security rely on a safe and resilient cyberspace. Unfortunately, the number of cyber-attacks has increased dramatically over the last years, exposing confidential personal and business data, disrupting critical operations, and imposing exorbitantly high costs on the economy overall.

Just recently, J.P. Morgan Chase, America’s largest commercial bank with $2.39 trillion in assets, announced that about 76 million households and 7 million of small-business customers had been affected by a cyberattack in one of the most sweeping known global breaches. The company said the unknown attackers stole customers’ contact information, which included names, email addresses, numbers and addresses, affected an amount equivalent to almost two-thirds of American households.

A brief walk down memory lane of some the biggest recent cyber-attacks now include Adobe Systems, Automated Data Processing, Citigroup, E*Trade Financial, Fidelity Investments, Home Depot, HSBC, Nasdaq OMX, Neiman Marcus, Target and Wal-mart. It is not unlikely to consider that the information of every American has already been compromised in any of these publicly disclosed attacks.

Renowned information security experts and innovative service providers will present at Cyber Security World Conference 2014 their latest thinking to hundreds of senior executives focused on protecting enterprises and governmental agencies. Topics that will be discussed include:

• Is Biometrics the Key to Personal and Corporate Security?
• Strengthening the Security of Industry-wide Technology Infrastructure
• Cyber Security Megatrends Security Professionals can’t Ignore Today
• Key Considerations about Security in the Internet of Things Age
• Cyber Security and its Role in the Overall Security of the United States
• How Hackers Really Operate to Obtain Financial Data
• Designing and Managing Effective Information Security Programs

Cyber Security World Conference 2014 is produced by Golden Networking, the premier networking community for business and technology executives, entrepreneurs and investors. Panelists, speakers and sponsors are invited to contact Golden Networking by sending an email to information@goldennetworking.com.

Media Contact:
Julia Petrova
Media Relations Coordinator
Golden Networking
+1-414-FORUMS0
jpetrova@goldennetworking.com
http://www.goldennetworking.com

2nd World Tea & Coffee Expo Ends With a Positive Note; Attracts 4100 Business Visitors from India & Abroad

* 3rd Edition to be held at Mumbai, India – dates to be announced soon.

Mumbai, India, October 28th, 2014 — The 2nd edition of World Tea & Coffee Expo (http://www.worldteacoffeeexpo.com), India’s only International trade show dedicated to the Tea & Coffee Sectors ended successfully on 13th September 2014 with positive reviews from exhibitors and visitors alike. The Expo, held at Bombay Exhibition Centre, Mumbai, INDIA from 11th Sept till 13th Sept 2014, offers the only trade platform in India for the Hot Beverage industry for networking, business expansion and ideas exchange.

“Around 40 Indian and foreign exhibitors participated in the expo, which attracted over 4,100 business visitors from all parts of the country and many from foreign shores”. said Ms Priti Kapadia, director of Sentinel Exhibitions Asia Pvt. Ltd, the organizers. The expo witnessed striking of bulk deals, joint ventures/alliances, franchise enquiries, appointment of marketing agents and generated a large number of business enquiries.

This 3-day Expo showcased products, machineries and technologies from Indian & International companies related to Tea, Coffee and allied sectors. On display were Tea & Coffee brands in addition to Tea/Coffee Vending Machines, machinery, exotic and new-age products like Lemon tea, White tea, Anti-Diabetes Tea, Slimming Tea, Certification bodies, National & International Boards etc. Visitors included decision makers comprising of Retailers, Wholesalers, Distributors, hypermarkets/multi-product retail chains, Tea/Coffee Estate owners, Hotels /Airline and Food & Beverage professionals many of whom placed large orders with exhibitors.

This unique event was inaugurated by Dr. Liu Youfa, the Consul General of China in Mumbai who remarked that, “there is great scope for bilateral trade in the Tea & Coffee sectors between India & China as both the countries are big producers and consumers of Hot Beverages and both the Asian giants are witnessing significant lifestyle changes”

Ms. Saroja Sirisena, Consul General, Consulate General of Sri Lanka who also graced the inaugural session said, “India & Sri Lanka can share their natural advantage to increase bilateral trade in the Tea & Coffee sectors. Trade platforms like this have the potential to make easier for countries to do business with each other.” Mr. R C Agarwal of FAITTA & Mohani Tea Leaves Pvt. Ltd. & Mr. Suresh Kotak of Kotak Commodities Ltd. – both eminent personalities of this field – also graced the expo with their august presence and shared their valuable ideas.

Ms. Aparna Kulkarni from Neel Beverages Pvt. Ltd. one of the exhibitors said, “We are into ready to drink beverages offering various types of Teas such as Ice Tea, Lemon Tea etc which are convenient to carry, store and use. Participating in World Tea & Coffee Expo gives an exposure at National & International Level with our potential clients coming to meet us at a single location rather than us having to travel everywhere to meet them. I am very happy to be a part of this show as an exhibitor.”

According to Mr. R C Agarwal of Mohani Tea Leaves Pvt. Ltd. (an exhibitor), “We are very strong in North India and participation at this expo gave us an opportunity to meet potential clients and business partners from across India.”

In the words of Mr Tedesco Enrico, of Teamac Srl Italy, “India is a market of over 1 billion people and this is a platform which gave us an opportunity to present our state-of-the-art machinery to Indian tea companies.”

Stated Mr Sumit Shah, Madhu Jayanti International Ltd (an exhibitor),”We used this platform to launch a new product here which has been very well received. The expo has far exceeded our expectations in terms of quality and quantity of visitors.”

World Tea & Coffee Expo thus fulfilled the need for an organized event for Tea & Coffee Companies in India to come together to showcase their products, network, share learning and experiences and find suitable solutions to the industry’s problems. Workshop & Conference gave the event vibrancy and a knowledge sharing avenue. International participation was from Italy, Australia, UAE, Rwanda, and Switzerland

The organizers are planning to make the 3rd Edition of WTCE much larger in terms of content and size and are likely to announce the dates very soon. For further details; please log on to: http://www.worldteacoffeeexpo.com or call on +91 22 28625131 or email to priti@sentinelexhibitionsasia.com

Press & Media Contact:
Mitesh M Kapadia
Sentinel Public Relations Pvt Ltd / Sentinel Advertising Services
B-603, Samajdeep, Near Bhanu Park/Seasons Restaurant
Adukia Road, Off S V Road
Kandivli (W), Mumbai 400 067 India
Mob: +91 98205 03876
Tel: (022) 28625131/32
Fax: (022) 28625133
mitesh@publicrelationindia.com
http://www.publicrelationindia.com
http://www.worldteacoffeeexpo.com

Center for Technology & National Security Policy Guru James Kadtke, at Top Cyber Security Conference

Golden Networking brings Cyber Security World Conference 2014 New York City (www.CyberSecurityWorldConference.com), an extraordinaire gathering of dozens of security experts speaking with hundreds of senior executives focused on protecting today enterprise and government’s information assets.

New York City, NY, USA (October 28, 2014) — Dr. James Kadtke, Special Advisor on Converging Technologies for the Center for Technology & National Security Policy, will speak at upcoming Cyber Security World Conference 2014 New York City (http://www.CyberSecurityWorldConference.com), forum where cyber security experts are set to discuss topics such as protecting individuals and companies against cyber-attacks, biometrics as the future of security, risks brought by mobile computing, and protecting corporate and national infrastructure against foreign attacks.

Dr. Kadtke served as the Chief Scientist at Nonlinear Solutions, Inc. and a consultant to the Department of Defense and private industry on defense science. From 1999 to 2001 he was a AAAS Fellow at the Rand Science and Technology Policy Institute, supporting the White House Office of Science and Technology Policy, and afterward spent a year on the Science Committee in the US House of Representatives. He then served over three years on the staff of Senator John Warner of Virginia, where he handled technology, defense, and homeland security issues, and as staff designee on the Senate Armed Services Committee. More recently, he has served as Executive Director of the Accelerating Innovation Foundation, a research fellow at the National Defense University and George Mason University, and a consultant to the government on policy and research in the defense, technology, innovation, and homeland security areas. Until November 2012, he was the Industry and State Liaison at the National Nanotechnology Coordinating Office, which supports the National Science and Technology Council under the White House.

Dr. Kadtke received his Ph.D. in theoretical physics from Brown University in 1987, which included two years as a graduate fellow at Los Alamos National Lab, and then spent over ten years as a research faculty at the University of California at San Diego. He is a consultant in the Washington, DC area focusing on emerging technology, organization foresight, and innovation, and their effects on future economies, governance, and international security.

About Cyber Security World Conference 2014
Cyber Security World Conference 2014 is produced by Golden Networking, the premier networking community for business and technology executives, entrepreneurs and investors. Panelists, speakers and sponsors are invited to contact us by sending an email to information@goldennetworking.com.

Media Contact:
Julia Petrova
Media Relations Coordinator
Golden Networking
+1-414-FORUMS0
jpetrova@goldennetworking.com
http://www.goldennetworking.com

Cross-Post LLC Doubles Down on Technology Events

Social Media, SEO and Predictive Analytics lead conference topics in Europe and USA.

Athens, Greece (October 26, 2014) — Cross-Post LLC, parent company of Careerpointe™ Recruitment Classifieds Platform and Cross-Post Classified Networks, is attending two international recruitment events this week focused on Social Media, SEO and Predictive Analytics.

The International Classified Media Association #ICMAAthens annual conference was attended by CEO Carl Braun and Director of Business Development George Dratelis. The event, held in Athens, Greece featured speakers from Europe, Africa and the USA and was held at the Intercontinental Hotel.

On Monday, October 27, Braun will be flying from Zurich to Las Vegas to participate in the International Association of Employment websites, (IAEWS) Fall Congress, which will be attended by more than 100 CEO’s of employment websites and associated services.

“In the history of the job board business we have never seen more attention paid to advanced technologies delivering improved results from SEO, Social/Mobile and Predictive Analytics. The future of our industry will be controlled as much or more from activities in the back of the house as from marketing efforts on the customer side. Mobile will top the list and events like these are a wonderful opportunity to network and share ideas,” noted Braun.

According to Google, mobile search eclipsed desktop recently with 54% of users on a smartphone or tablet.

“Europe has a fresh way of looking at traffic development and innovative strategies for employment websites I think,” said Braun. “Several of the folks that are here in Greece at this event will also be attending IAEWS.” He added.

Cross-Post launched the Careerpointe™ Recruitment Classifieds Platform earlier this year from a partnership meeting they had with CareerLeaf of Toronto, Canada at the Spring IAEWS Congress in Nashville. Their award winning (ONREC2014) Tracklet™ technology is now a key component of the Careerpointe™ platform.

Braun and Dratelis plan on taking information and partnerships made at these events to create the next generation of candidate-focused job boards.

“Don’t be too surprised if International plays a huge role in the next product launch.” Dratelis said.

About Cross-Post LLC

Cross-Post LLC was founded in 2004 by recruitment industry executives Carl Braun and John Fujii. It provides niche classified recruitment networks to publishers and today has nearly 200 newspaper clients. The addition of the CareerPointe™ Recruitment Classifieds Platform and the WheelPointe™ Auto Platform offer customers increased flexibility with no long term contracts and dramatically reduced costs.

Contact:
Carl Braun, CEO
Cross-Post LLC
PO BOX 5425
Petaluma, CA 94955
619-575-6577
carl@cross-post.com
http://www.cross-post.com

Risk Management Technology Leader Robert Gardner to Keynote Cyber Security World Conference 2014

Golden Networking brings Cyber Security World Conference 2014 New York City (www.CyberSecurityWorldConference.com), forum that will provide the latest thinking from dozens of security experts to hundreds of senior executives focused on protecting today enterprises’ information assets.

New York City, NY, USA (October 23, 2014) — Robert Gardner, founding partner of New World Technology Partners (NWTP), will keynote upcoming Cyber Security World Conference 2014 New York City (http://www.CyberSecurityWorldConference.com), unique forum where cyber security experts are set to discuss topics such as protecting individuals and companies against cyber-attacks, biometrics as the future of security, risks brought by mobile computing, and protecting corporate and national infrastructure against foreign attacks.

Mr. Gardner’s presentation, “The Enterprise Impact of Cyber Risk – through the Shareholder Lens,” is based upon 40 years of study and practice of cyber assurance. Beyond the security that can be achieved by responsible cyber hygiene (which we still do not practice, but can prevent 75% or more of the problem), according to Mr. Gardner, critical infrastructure and national leaders must consider two paradigm shifts in their risk management thinking:

1. The cyber eco-system underpinning their enterprise is not what they think it is – it has become a real-time complex system of systems – where runaway complexity presents systemic risks and exploitable vulnerabilities, which may have immediate, irreversible stakeholder consequences. (i.e. before the next 10Q or congressional hearing)

2. It can be managed by isolating the most consequential incidents – quantifying and prioritizing (aka Risk Triage) their financial, reputation/political and legal/regulatory exposure – which can be achieved by several old ( Bell Labs vintage system engineering analyses) and new (socio-political sentiment analysis) techniques.

However the C-Suite and their Boards must really get into the game to set the tone and become Cyber Exposure savvy, says Mr. Gardner. He has been a leader in cyber and critical infrastructure risk management technology and an incubator of technology enterprises since the mid-seventies. Mr. Gardner managed/participated in the launch of several development stage companies formed around those technologies, including August Systems, Verdix, Meiko Scientific, Cryptek, Phoenix Numeric and Probity Labs.

• Formed The Probity Group to provide enterprise risk analyses for executives regarding complex systems and critical infrastructure risk. Coordinated development of Gradient™ technology to quantify systemic risk causes and consequences for commercial, federal and international enterprises.
• Incubated iRISK™ Enterprise Risk Management methodology for a Fortune 500 enterprise to quantify the financial and public reaction (brand) consequences of cyber risk affecting shareholder and national security interests. Underlying intellectual property was vetted by industry, government and academic leaders in Energy, Financial Services, Chemical and Homeland Security communities.
• Rebuilt security division of a public company which developed the first B2 Multi-level Secure (MLS) Network evaluated by NSA, and spun it off to a public secure communications company. Arranged financing and managed turn-around of the merged company. Strengthened secure products portfolio for U.S. and International markets, which reversed losses and achieved rapid profitability. Coordinated sale of company to prominent U.S. hedge fund.
• At a mid-cap DoD service provider, he created an intellectual property incubator which introduced Trusted TeamWorks™ and other cyber risk innovations.
• Incubated Supercomputer technology into products for U.S. operation of a U.K. parallel processing company. Successfully competed for high visibility Government and Industrial accounts, and was awarded the 1991 Northeast Small Business Prime Contractor of the Year recognition.
• Member of startup team which developed NASA’s Software Implemented Fault Tolerance (SIFT) technology, pioneering Triple Modular Redundant (TMR) fault tolerant control systems. Business achieved success among International energy companies and Government Agencies. Subsequently spun off and acquired by ABB, which still operates 1000s of systems.

Prior to forming NWTP, he held senior engineering and technical marketing positions for ILLIAC IV, PEPE, LDSP and NASF supercomputer projects at Burroughs Corporation, for which he received numerous technical and market accolades and awards.

He often writes and speaks on topics regarding intellectual property and has prepared briefings and testimony for the U.S. House of Representatives and Senate caucuses on the technology impact on Financial (TARP) Infrastructure and The “First Three Hours” Emergency Response Methods.

Mr. Gardner also teaches business planning for artists at New York City’s “Third Ward” creative incubation center, and assisted formation and governance of New York based arts enterprises, including The Brick Theater and In The Pocket NYC. He has a BSEE from Rensselaer Polytechnic Institute and studied graduate system engineering and business administration at Penn State and the University of Santa Clara respectively.

About Cyber Security World Conference 2014
Cyber Security World Conference 2014 is produced by Golden Networking, the premier networking community for business and technology executives, entrepreneurs and investors. Panelists, speakers and sponsors are invited to contact us by sending an email to information@goldennetworking.com.

Media Contact:
Julia Petrova
Media Relations Coordinator
Golden Networking
+1-414-FORUMS0
jpetrova@goldennetworking.com
http://www.goldennetworking.com

TFE Live Online Workshops Fill the Soft Skills Gap

Sign Up for the Training for Entrepreneurs.com 9 Live, Interactive Workshop Sessions.

Sarasota, Florida, USA (October 22, 2014) — Training for Entrepreneurs.com (TFE) bridges the soft skills gap with the introduction of online training workshops. Live, instructor-led interactive workshops will help employers get self-motivated employees who take the initiative and deliver more than ever expected.

Enroll today for these affordable 90-minute TFE Business Soft Skills Training Workshops that begin in December 2014. Build essential skills through an interactive workshop that fits in a busy schedule.

Pick one or more of these live, instructor-led workshops that deliver what employers want, and what employees need.

Do your employees fall short of having a productive mindset? Then sign them up for the Boosting Personal Productivity workshop to show them how to use the right motivation under the right circumstances to do so much more. Just 50 seats are available for this first online, live instructor-led workshop session on Dec. 3, 2014.

Let TFE’s instructors train you and your employees to bring soft skills to the highest level in a live workshop.

For just $77 per workshop, an employee will get the key soft skills to perform beyond normal requirements, adding value for their employer. Sign up for eight and get the ninth workshop free.

Add these Soft Skills to your repertoire or that of your employees:

• Boosting Personal Productivity – Do more with the right motivation. Enrollment open for Dec. 3, 2014.
• Being Resilient – Learn how to not just survive, but thrive.
• Communicating Effectively – Build skills to effectively share information, ideas, and needs.
• Relating to Others – Build rapport and trust while improving listening skills.
• Presenting with Conviction – Learn to deliver presentations that push projects forward.
• Solving Problems – Gain skills to reason through business problems.
• Teaming with Others – Learn when to be a leader, when to follow and work with others.
• Resolving Conflict – Improve abilities to persuade, negotiate, and resolve conflicts.
• Networking for Success – Develop an effective action plan for outstanding networking.

Training for Entrepreneurs.com trains and mentors the entrepreneur through its live virtual mentoring programs, workforce training seminars (including customized courseware) and live, onsite as well as online business soft skills training workshops. TFE publishes Special Reports and first-rate, educational content for aspiring entrepreneurs and business owners/executives via the TFE Virtual Vault of Knowledge.

Media Contact:
Terry H. Hill
Chief Business Mentor
Training for Entrepreneurs.com
8374 Market Street #167
Lakewood Ranch, FL 34202
Phone: 941-556-1299
Fax: 941-866-1953
solutions@trainingforentrepreneurs.com
http://www.trainingforentrepreneurs.com

GLTYR Gives Life To Your Reality

Instantly Create And Send Multimedia Messages With GLTYR

Scottsdale, AZ, October 22, 2014 — GLTYR, which stands for “Give Life To Your Reality,” is a mobile content-creation service for businesses and service providers with extremely limited marketing budgets. GLTYR allows the user to create a multimedia message or a spot commercial integrated with picture, text, audio and video that can be easily shared with a link though a text message, email or on social media platforms.

GLTYR is perfect for small business owners, individual service providers like doctors, plumbers, real estate agents, performing artists, schools, non-profits, sales professionals, literally anyone who wants to connect with their audience quickly and have their message heard loud and clear!

GLTYR is mobile only, meaning the content is created entirely on a mobile device, but your message can be shared across all devices and browsers. Once your message is created with GLTYR, it can be easily edited from your mobile device and when you click “Save”, the link to your GLTYR profile is immediately updated.

Think of GLTYR as the “Dropbox” for multimedia content sharing.

Before GLTYR, there was no platform that offered the opportunity to convey a quick and efficient multimedia message that builds trust with your audience instantly.

GLTYR offers just that by incorporating picture, audio and video into the message. GLTYR had its roots as a mobile multimedia resume creation service in efforts to give resumes a little pizazz! Traditional resumes sent on paper or via email are the least impactful ways to make an emotional connection with an audience. Picture, audio and video are the most powerful forms of media to build trust, as they give your audience a chance to see a complete picture of who you are or what your message is all about which can otherwise be lost by reading an email or by simply looking at your paper resume.

Founder Dr. Subra Sudhakar commented, “Trust is the fundamental building block for any successful, long-term relationship. But how can we build trust quickly in a virtual world with limited attention spans, where we’re all connected only through technology via mobile devices and computers? What’s the best way to get your customers’ attention quickly, build relationships, and make your message heard to help them decide whether or not to do business with you? GLTYR solves this problem in five minutes or less entirely from a mobile device.”

Here are just some of the unique ways that the GLTYR app can be used for:

* Personal Commercials
* News bulletins
* Announcements
* Invitations/Events
* Product Information
* Testimonials
* Greeting Cards
* Resume’s
* Sales Pitches
* Dating Profiles
* Recipes
* Job Listings
* Coupons/Promotions
* Company Profiles
* Digital Signatures

About GLTYR:
Founded in 2013, GLTYR Gives Life To Your Reality! GLTYR allows the user to create a unique multimedia message or a commercial with an image, a 30 second audio, a 30 second video and up to 900 characters of text that can be easily edited and shared with a link by text message, email or on social media platforms, all through your smartphone.

GLTYR is quick and easy. Make your GLTYR profile from your mobile device in less than five minutes. Individual accounts are available for free for iPhone on iTunes here: https://itunes.apple.com/us/app/gltyr/id775374414?mt=8

Try GLTYR for Android in Beta on Google Play here: https://play.google.com/store/apps/details?id=com.gltyr.gltyr

For more information, visit the GLTYR website: http://gltyr.com/.

Contact:
Scott Kelly
Black Dog Promotions
9920 S. Rural Rd., Ste 108
Tempe, AZ 85284
480-206-3435
http://www.blackdogpromotions.com