Pre-Recorded Webcasts

Ecora's archived webcasts provide the information you need on configuration audit, change management, compliance and IT best practices in a pre-recorded format to fit your busy schedule.

Refer to a Colleague

Share Ecora events information

Enter your name:


Enter your e-mail address:


Send this page to:


Optional comments:

View pre-recorded webcasts on the following subjects:
Auditor Pro Tips & Tricks
Capacity Planning
Change Management
Compliance & Security
Disaster Recovery and Business Continuity
eDiscovery Webinars
ISO 27001 Compliance Reporting
Patch Management
SAS 70 Audits
TechTalk Webinar Series

Auditor Pro Tips & Tricks Webinar Series

November 03, 2008

Granular Collections with Auditor Pro 4.5

Ecora is offering a series of interactive training presentations hosted by an experienced member of our Professional Services team to ensure users of Auditor Professional have a proactive view of the IT infrastructure ensuring critical business services remain operationally effective, secure, and compliant with internal standards and external regulations.


October 20, 2008

Using Ecora Auditor to Know Who Made the Change

Ecora is offering a series of interactive training presentations hosted by an experienced member of our Professional Services team to ensure users of Auditor Professional have a proactive view of the IT infrastructure ensuring critical business services remain operationally effective, secure, and compliant with internal standards and external regulations.


October 6, 2008

Archiving Ecora Auditor Data

Ecora is offering a series of interactive training presentations hosted by an experienced member of our Professional Services team to ensure users of Auditor Professional have a proactive view of the IT infrastructure ensuring critical business services remain operationally effective, secure, and compliant with internal standards and external regulations.


September 22, 2008

Getting Started with Auditor Pro 4.5

Ecora is offering a series of interactive training presentations hosted by an experienced member of our Professional Services team to ensure users of Auditor Professional have a proactive view of the IT infrastructure ensuring critical business services remain operationally effective, secure, and compliant with internal standards and external regulations.


September 8, 2008

Customizing Policies and Reporting with Ecora Auditor Pro 4.5

Ecora is offering a series of interactive training presentations hosted by an experienced member of our Professional Services team to ensure users of Auditor Professional have a proactive view of the IT infrastructure ensuring critical business services remain operationally effective, secure, and compliant with internal standards and external regulations.


August 11, 2008

Introducing Auditor Pro 4.5

Ecora is offering a series of interactive training presentations hosted by an experienced member of our Professional Services team to ensure users of Auditor Professional have a proactive view of the IT infrastructure ensuring critical business services remain operationally effective, secure, and compliant with internal standards and external regulations.


July 21, 2008

Customizing Fact Finding Reports in Auditor Pro 4.5

Ecora is offering a series of interactive training presentations hosted by an experienced member of our Professional Services team to ensure users of Auditor Professional have a proactive view of the IT infrastructure ensuring critical business services remain operationally effective, secure, and compliant with internal standards and external regulations.


July 07, 2008

Granular Collections with Auditor Pro 4.5

Ecora is offering a series of interactive training presentations hosted by an experienced member of our Professional Services team to ensure users of Auditor Professional have a proactive view of the IT infrastructure ensuring critical business services remain operationally effective, secure, and compliant with internal standards and external regulations.


June 23, 2008

Enhancing Security Management with Auditor Pro 4.5

Ecora is offering a series of interactive training presentations hosted by an experienced member of our Professional Services team to ensure users of Auditor Professional have a proactive view of the IT infrastructure ensuring critical business services remain operationally effective, secure, and compliant with internal standards and external regulations.


June 09, 2008

GLBA Reporting with Auditor Pro 4.5

Ecora is offering a series of interactive training presentations hosted by an experienced member of our Professional Services team to ensure users of Auditor Professional have a proactive view of the IT infrastructure ensuring critical business services remain operationally effective, secure, and compliant with internal standards and external regulations.


May 19, 2008

Validating the Accuracy of your CMDB with Auditor Pro 4.5

Ecora is offering a series of interactive training presentations hosted by an experienced member of our Professional Services team to ensure users of Auditor Professional have a proactive view of the IT infrastructure ensuring critical business services remain operationally effective, secure, and compliant with internal standards and external regulations.


May 12, 2008

SOX Reporting with Auditor Pro 4.5

Ecora is offering a series of interactive training presentations hosted by an experienced member of our Professional Services team to ensure users of Auditor Professional have a proactive view of the IT infrastructure ensuring critical business services remain operationally effective, secure, and compliant with internal standards and external regulations.


April 21, 2008

Integrating Service and Help Desk Tools with 4.5

Ecora is offering a series of interactive training presentations hosted by an experienced member of our Professional Services team to ensure users of Auditor Professional have a proactive view of the IT infrastructure ensuring critical business services remain operationally effective, secure, and compliant with internal standards and external regulations.


April 14, 2008

HIPAA Reporting with Ecora Auditor Pro

Ecora is offering a series of interactive training presentations hosted by an experienced member of our Professional Services team to ensure users of Auditor Professional have a proactive view of the IT infrastructure ensuring critical business services remain operationally effective, secure, and compliant with internal standards and external regulations.


March 24, 2008

Using Auditor Pro 4.5 in Distributed Environments

Ecora is offering a series of interactive training presentations hosted by an experienced member of our Professional Services team to ensure users of Auditor Professional have a proactive view of the IT infrastructure ensuring critical business services remain operationally effective, secure, and compliant with internal standards and external regulations.


March 17, 2008

Service Management Interface Connector in Auditor Pro 4.5

Ecora is offering a series of interactive training presentations hosted by an experienced member of our Professional Services team to ensure users of Auditor Professional have a proactive view of the IT infrastructure ensuring critical business services remain operationally effective, secure, and compliant with internal standards and external regulations.


March 10, 2008

Compliance Center in Auditor Pro 4.5

Ecora is offering a series of interactive training presentations hosted by an experienced member of our Professional Services team to ensure users of Auditor Professional have a proactive view of the IT infrastructure ensuring critical business services remain operationally effective, secure, and compliant with internal standards and external regulations.


March 3, 2008

Optional Agent with Auditor Pro 4.5

Ecora is offering a series of interactive training presentations hosted by an experienced member of our Professional Services team to ensure users of Auditor Professional have a proactive view of the IT infrastructure ensuring critical business services remain operationally effective, secure, and compliant with internal standards and external regulations.


February 18, 2008

Upgrade Considerations for Auditor Pro 4.5

Ecora is offering a series of interactive training presentations hosted by an experienced member of our Professional Services team to ensure users of Auditor Professional have a proactive view of the IT infrastructure ensuring critical business services remain operationally effective, secure, and compliant with internal standards and external regulations.


December 17, 2007

Installing and Using Ecora Executive Dashboard

Ecora is offering a series of interactive training presentations hosted by an experienced member of our Professional Services team to ensure users of Auditor Professional have a proactive view of the IT infrastructure ensuring critical business services remain operationally effective, secure, and compliant with internal standards and external regulations.


December 10, 2007

Auditor Pro Administration

Ecora is offering a series of interactive training presentations hosted by an experienced member of our Professional Services team to ensure users of Auditor Professional have a proactive view of the IT infrastructure ensuring critical business services remain operationally effective, secure, and compliant with internal standards and external regulations.


July 19, 2007

Creating your own Fact Finding Reports

Ecora is offering a series of interactive training presentations hosted by an experienced member of our Professional Services team to ensure users of Auditor Professional have a proactive view of the IT infrastructure ensuring critical business services remain operationally effective, secure, and compliant with internal standards and external regulations.


July 17, 2007

Creating your own policies in Auditor Professional Executive Dashboard

Ecora is offering a series of interactive training presentations hosted by an experienced member of our Professional Services team to ensure users of Auditor Professional have a proactive view of the IT infrastructure ensuring critical business services remain operationally effective, secure, and compliant with internal standards and external regulations.


eDiscovery Webinars

Records Retention: Introduction to Effective Records and Data Management Programs

September 10, 2008

Robert W. Dibert is counsel with the Louisville, Kentucky, office of Frost Brown Todd, LLC. He has litigated commercial transactions and business relationships for more than 20 years, including banking, contracts, employment terminations, joint ventures and securities transactions.


Current and Emerging Issues in Data Privacy Protection Law

August 20, 2008, 1:00 pm EDT

Jane Hils Shea is chair of the Privacy and Information Security Law Practice Group at Frost Brown Todd LLC. She practices primarily in the areas of commercial law, privacy law, bank regulatory law, and electronic funds transfer laws and regulations. Ms. Shea has spent sixteen years serving as counsel to several Cincinnati area banks and also served twelve years as an Adjunct Professor of Law at University of Cincinnati College of Law.


June 18, 2008

5 Ways to Avoid High Data Loss Litigation Fines

Headlines related to significant cases of data loss are appearing with ever increasing frequency. Many of these high-profile stories involve perpetrators gaining inappropriate access to some form of corporate or consumer financial data, primarily credit or debit card information. Yet, in a growing number of litigation cases, significant fines have been imposed by the court when litigants were unable to produce certain forms of data or validate that their IT infrastructure was appropriately and securely configured to prevent the loss of that data.


April 9, 2007

eDiscovery: Can You Secure the Infrastructure Around the Data You Must Save?

William Morriss is an Associate of Frost Brown Todd LLC in the Intellectual Property Department also a member of my firm's information management and electronic discovery practice group.. He has a focus on subject matter related to computer software, including patent prosecution, patent litigation, and licensing transactions. Mr. Morriss is approved to practice before the United States Patent and Trademark Office and holds a degree in computer science.


Disaster Recovery and Business Continuity

November 19, 2008

Introducing BS 25999 - The Standard and Its Value Proposition

BS 25999 became a formal business continuity standard in November 2007. Since then, a very large number of organizations from all around the world in both the public and private sector began evaluating the standard, as well as the value associated with the certification process.


August 13, 2008

Business Continuity 101: The Basics

Patrick Dunn, Practice Lead with Orange Parachute, Inc., has worked with multi-national, Fortune 500 and Big Five accounting firms for more than fifteen years to address issues related to the effective design, implementation and effective management of IT Projects, IT Security, Business Transformation, Disaster Recovery, and Business Continuity Management.


July 16, 2008

Orange Parachute: Disaster Recovery Basics

Patrick Dunn, Practice Lead with Orange Parachute, Inc., has worked with multi-national, Fortune 500 and Big Five accounting firms for more than fifteen years to address issues related to the effective design, implementation and effective management of IT Projects, IT Security, Business Transformation, Disaster Recovery, and Business Continuity Management.


July 9, 2008

Lessons from the Data Center Hall of Shame

Natural and man-made disasters have gripped communities around the world in the last several months. These disasters serve as humbling reminders of just how quickly the stability of our corporate infrastructure and the stability of our employees' personal lives can become chaotic and unpredictable in an instant. As you consider your organization's IT disaster recovery plans, do you know if your data center has the right procedures and equipment to recover from a disaster?


May 7, 2008

Keys to Ensuring Your Data Center Can Recover From Any Disaster

Recent natural and man-made disasters like the apparent tornado in Atlanta, the crane falling in New York City, and the rain and flooding throughout much of the country all serve as reminders of just how quickly the stability of our corporate infrastructure and those of our employees can instantly become chaotic and unpredictable.


SAS 70 Audits

October 15, 2008

The Explosive Growth of SAS 70 Audits

It once was a little-known auditing standard, but much has changed of late for Statement on Auditing Standards No. 70, more commonly known as SAS 70. Over the past five years, the number of SAS 70 audits has grown explosively due to the massive wave of regulatory compliance mandates and legislation unleashed in this country. From Sarbanes Oxley (SOX) to Gramm Leach Bliley (GLBA) and many other requirements, the SAS 70 auditing standard is alive and well, often used as the main "go to" compliance audit for many of these well-known regulatory compliance laws.


TechTalk Webinar Series

December 20, 2007

Verifying Security Controls in MS SQL

MS-SQL is used to power some of your most critical information applications and contains some of your organization's most valuable data. The need to deliver this data is constant in today's global economy and so are the threats you must secure that data against.


November 15, 2007

Standardizing Windows Desktop Configurations

Regulatory compliance regulations and information technology best practice frameworks have historically touted the benefits of configuration standardization for servers. Now, more emphasis is being placed on desktop configuration standardization. Beginning in February 2008, federal agencies will need to prove they comply with the Office of Management and Budget (OMB) Directive M-07-11.


November 29, 2007

Real Help for Migrating to a Virtual World

Regulatory compliance regulations and information technology best practice frameworks have historically touted the benefits of configuration standardization for servers. Now, more emphasis is being placed on desktop configuration standardization. Beginning in February 2008, federal agencies will need to prove they comply with the Office of Management and Budget (OMB) Directive M-07-11.


Patch Management

November 30, 2006

Automating Critical Security Patches

Discover how consistent, accurate patch analysis and reporting reduces the time and cost of keeping your system patched and eliminates new vulnerabilities before they can be exploited.


PCI DSS Compliance Reporting

June 6, 2007

The Shocking Truth about PCI Assessments

Merchants and processors who accept or process credit or debit card transactions are under increasing scrutiny to ensure cardholder data is securely handled and stored. Visa recently announced a new Compliance Acceleration Plan that requires level one and two merchants and their acquirers to comply with the PCI Data Security Standard by the end of the year. Those failing to do so are likely to face substantial fines. Visa doled out over $4.6 million in fines in 2006.


June 6, 2007

Part 1: Achieve and Maintain PCI Compliance Through Automated Detailed Configuration and Change Reporting

View this Webcast* and learn key steps for validating compliance with the PCI Data Security Standard. Log on to hear how to adhere to the PCI security standard by automating detailed configuration and change reporting used to identify and validate configuration changes in virtually all operating systems, database management systems, applications an network devices.


Sarbanes-Oxley Compliance Reporting

Strategic Tactics and Controls for SOX Compliance

Recently the SEC postponed the deadline for SOX compliance for small and medium sized businesses (SMBs) until July 2007. SMBs face the same rules and regulations as large companies do in regards to SOX compliance. With limited IT, HR, and financial resources, complying with SOX is of great concern to SMBs. It is imperative that SMBs start the process now in order to meet the July 2007 compliance deadline.


GLBA Compliance Reporting

GLBA Compliance Webinar: Automate Compliance Audit Reporting

View this Webcast and learn the necessary steps any organization must take to comply with the Gramm-Leach-Bliley Act (GLBA). Log on to hear Khalid Kark, Senior Research Analyst at Forrester Research discuss how any organization can reduce compliance costs by automating the process of attaining and maintaining proper financial privacy and consumer data safeguard procedures.


HIPAA Compliance Reporting

Ensuring Electronic Medical Records are Available and Secure in Complex Medical IT Environments

Michael Davis is Executive Vice President of HIMSS Analytics and has over 30 years of healthcare experience. In this webinar, Michael will provide a review of the provider healthcare IT environment based on research by HIMSS Analytics. Michael's discussion will focus specifically on overall application adoption, projected spending as it relates to the increasing complexity and sophistication of hospital IT environments, and the increasing complex infrastructures needed to support these environments.


Capacity Planning

Introduction to Capacity Management

October 8, 2008, 1:00 pm EDT

The present global economic climate has every organization looking to minimize expenses, while maximizing productivity. Given the efficiencies that are typically found in automating business processes, IT is faced with the challenge of providing even greater value, while still holding the line on budget and personnel.Capacity management is a process for planning, analyzing, sizing and optimizing capacity to satisfy demand in a timely manner and a reasonable cost.


Change Management

September 18, 2008

Improving Change Management through Better Testing

IT Operations groups are under tremendous pressure to maintain nearly 100% uptime for a growing number of multi-tiered systems running on large production infrastructures. As the number of changes across the business application stack grows due to more complex environments and IT trends, IT operations teams will need to understand the impact of changes and feel more certain about the changes they implement.


July 23, 2008

The Influence of Application Selection on Testing and Change Management

Differences in application complexity, lead time prior to changing application versions, and downtime costs associated with a particular application all heavily influence how companies approach the adoption of proper testing and change management, according to a new study conducted by Research Edge.


April 2, 2008

The Link Between Downtime and Immature Change Management

Uncontrolled change is the leading cause of downtime for multi-tier business applications. IT departments are often unaware of these changes because they lack visibility into what is happening in their environment. Often, IT operations fail to adequately stage and test approved changes before they are deployed to understand the impact of those changes. In addition, IT staff is usually woefully unaware of unauthorized changes that are made outside approved processes until a downtime incident has occurred.


Automating Change Management for Security, Compliance, Stability and Sanity!

View this Webcast to learn the importance of change management in today's complex IT infrastructures. Log on to hear Alex Bakman, Founder, Chairman & Chief Technology Officer at Ecora Software as he addresses a live audience at the 2006 IT Infrastructure Management Association Conference in Las Vegas, Nevada. He'll discuss:


EMA Webinar: Reining in the Effects of Uncontrolled Change

View this Webcast to learn the value of IT Service Management as a process-based practice instrumental for optimizing service quality, improving service levels, reducing service delivery costs and maximizing the business value of IT. Log on to hear Andi Mann, Research Director at Enterprise Management Associates and James Sayles, Chief Compliance Advisor at Ecora Software as they showcase the value of IT Service Management in addressing security, compliance, and operational effectiveness. They will discuss:


Security and Compliance Audit Reporting

September 24, 2008

How Companies are achieving PCI Compliance for Security & Performance of Information Systems

Are you struggling to meet the demands of PCI Compliance? Do you want to reduce the amount of time your IT organization spends on preparing, documenting and demonstrating PCI Compliance across the enterprise?


August 06, 2008

5 Keys to a Successful Customer Information Risk Assessment

Data theft continues to make headlines. In nearly every case, these breaches could have been prevented if proper risk management activities were implemented per industry laws and regulations. Whether it's the Payment Card Industry Data Security Standard, Gramm Leach Bliley, Health Insurance Portability and Accountability Act or local state laws and regulations, compliance with privacy rules and regulations is required or the organization risks costly lawsuits and negative publicity that result in financial losses. By building continual risk assessment and compliance into your operations, you can effectively mitigate the risk of data theft, reduce financial loss due to non-compliance, and lower the compliance costs.


July 30, 2008

The Dirty Little Secret About Audits

Audits are a part of business life, right? Too often, however, audits require near-herculean efforts on the part of auditors and already taxed operational teams to get them over the goal line. Many times management isn't aware of the challenges auditors face, but the auditors could tell you war stories. The long nights and weekends required to wade through existing documentation first to determine what has been presented and then to identify what else needs to be collected and reported. The delays in getting information requests fulfilled by operational teams who are primarily tasked with keeping business services available. The use of small, non-representative samples of servers because anything more would cause too much disruption and create too much work to be completed in the time allotted. The use of general office applications to capture and manage data from a variety of sources that are vulnerable to improper manipulation.


May 21, 2008

Forrester Webinar: Improving Enterprise Governance, Risk and Compliance Initiatives

Technology plays a vital role in governance, risk, and compliance (GRC) initiatives. An effective enterprise GRC strategy will employ technology to drive sustainability, consistency, efficiency, and transparency into GRC oversight. The practice of GRC has evolved from siloed applications, documents, and spreadsheets to more of an enterprise content management approach. Consequently, strong workflow, communication, and analysis capabilities have become essential components of the enterprise program.


September 24, 2008

How Companies are achieving PCI Compliance for Security & Performance of Information Systems

Are you struggling to meet the demands of PCI Compliance? Do you want to reduce the amount of time your IT organization spends on preparing, documenting and demonstrating PCI Compliance across the enterprise?


March 19, 2008

Building Compliance into Operations

Theft of data continues to make headlines, inevitably leading to new regulatory requirements. Each regulatory mandate adds another project initiative, yet there is generally little coordination or integration of these projects and ongoing maintenance and update is difficult. Mechanisms to centralize risk assessment data for these projects are complex. The results are often stale data with questionable ongoing value. By building continual risk assessment and compliance into your operations, you can effectively mitigate the risk of data theft, reduce financial loss due to non-compliance, and lower the overall cost of compliance.


December 26, 2007

Combining Configuration Detail with Event Analysis: Stronger Defense

Availability of business services is core to the mission of IT and security. Many organizations require five-nine reliability and incorporate these expectations into service level agreements (SLAs). Unfortunately, meeting this level of service is jeopardized by limited understanding of today's complex infrastructures. Leading industry analysts all point to system misconfigurations as the leading cause for downtime and security breaches. Security incident response, where minutes costs millions, requires being able to isolate root cause - often an unauthorized change that introduced vulnerability or weakness.


December 12, 2007

Preventing Data Theft through Compliance

Theft of data continues to make headlines, inevitably leading to new regulatory requirements. Each regulatory mandate adds another project initiative, yet there is generally little coordination or integration of these projects and ongoing maintenance and update is difficult. Mechanisms to centralize risk assessment data for these projects are complex. The results are often stale data with questionable ongoing value. By building continual risk assessment and compliance into your operations, you can effectively mitigate the risk of data theft, reduce financial loss due to non-compliance, and lower the overall cost of compliance.


ISO 27001 Compliance Reporting

November 05,2008

Leveraging ISO 27001 for Improving the Security, Compliance and Performance of Information Systems

Steve Wright, Senior Manager for Risk & Advisory Services at PriceWaterhouseCoopers LLP, has worked with many international organizations to complete ISO27001 Certification projects over the past eight years and has worked with many of these same corporations to establish information security management systems (ISMS) compliant with Corporate Governance requirements such as - Combined Code, HIPAA, SOX, CobiT, ITIL, PCI DSS, ISO9001 and CMMI.


June 18,2008

Leveraging ISO 27001 for Improving the Security, Compliance and Performance of Information Systems

Steve Wright, Senior Manager for Risk & Advisory Services at PriceWaterhouseCoopers LLP, has worked with many international organizations to complete ISO27001 Certification projects over the past eight years and has worked with many of these same corporations to establish information security management systems (ISMS) compliant with Corporate Governance requirements such as - Combined Code, HIPAA, SOX, CobiT, ITIL, PCI DSS, ISO9001 and CMMI.


IT Management

March 5, 2008

EMA Webinar: Dealing with Complexity in Large IT Implementations

Today's IT managers are challenged to satisfy a broad range of IT requirements while dealing with very complex IT Infrastructures. This is particularly true in businesses with especially large IT implementations. Although tools are typically employed to automate standardized processes to ensure compliance is achieved, the reality of heterogeneous environments and the specialization needed to support specific practice areas often require the utilization of many disparate tools that are not integrated and require repetitive duplication of effort to manage effectively.