Gain a Birds Eye View of Enterprise GRC
Panel Webinar on August 25th: GRC Evolution in Digital Enterprises as ERM and Cyber Security Converge. RSVP Now!
White Paper: Effectively Managing Privacy Risk in Processing Personal Data
Live Webinar: Data-Centric Security: Staying Ahead of the Threat Curve
Attend this panel webinar on September 21st at 1pm EST. Reserve your seat now!
Delivering Data Security with Hadoop and the IoT
Attend this webinar on August 9th at 1pm EST. Click here to confirm your seat!
Striving for Data Security in the Cloud
Join Rebecca Herrold (the Privacy Professor) and our panel on October 18th at 1pm EST for: IT Security & Privacy Governance in the Cloud.
Recorded: March 22 | 2016 Attend
Under the rules of PCI DSS v3.1, SSL and early versions of the Transport Layer Security (TLS) protocol are no longer considered acceptable for payment data protection due to "inherent weaknesses" within the protocol. Organizations who process payments must migrate to TLS 1.1 encryption or higher by June 2018. Prior to this date, existing implementations using SSL and/or early TLS must have a formal risk mitigation and migration plan in place. Moreover, details have just been released on the upcoming PCI DSS 3.2.
Recorded: February 24 | 2016 Attend
In every organization, there are a multitude of applications and devices and a universe of threats and vulnerabilities. Every process, function and system has certain risks and compliance requirements. It is no longer enough to have a handful of diligent security and compliance professionals managing the organization's risk strategies and controls. Their processes must embrace business and mission professionals' knowledge of risk, who evaluate the causal impact of threats to their operational performance, and participate in decision-making to meet their risk posture goals.
Recorded: December 10 | 2015 Attend
In 2014 around 40 percent of data breaches were the result of external intrusions, while the remainder were caused by a lack of internal controls/employee actions, lost or stolen devices/documents, and social engineering/fraud. The good news is that the vast majority of security breaches can be prevented by implementing and enforcing basic security best practices with proven technologies.
Recorded: November 12 | 2015 Attend
In a landscape filled with new threats and new regulations, risk management has never been more critical to senior leaders across all sectors. The growth of data is increasing exponentially, organizations are suffering from volatility across all risk types, and need to re-think their enterprise risk strategy. At the heart of this strategy is the need for a single consistent view of the data, and a data-centric, multi-platform approach to secure valuable customer and corporate data assets, end-to-end.
Recorded: October 29 | 2015 Attend
Managing third-party risk is a big undertaking. Most financial institutions have tens of thousands of supplier relationships, and many data breaches originate through IT Vendors within the supply chain. Not only are the risks associated with third-party vendors increasing, but regulators are turning their attention to the need for organizations to manage IT vendor risk more effectively.