REGISTER

Latest News

On-Demand

  • PanelIT Security & Privacy Governance in the Cloud

    Recorded:    October 18th | 2016       Attend

    After multiple newsworthy data breaches in recent times, IT security and privacy governance has gained importance across the globe. Most organizations have established security and compliance policies and procedures to protect their intellectual property and corporate assets, especially in the IT space.

  • TRUSTe LogoEffectively Managing Privacy Risk in Processing Personal Data

    In this whitepaper, Michael Rasmussen - The GRC Pundit - explains why many organizations should strongly consider a best-in-breed approach to managing data privacy management over alternatives including spreadsheets or existing enterprise GRC solutions.

  • Sept21TNData-Centric Security: Staying Ahead of the Threat Curve

    Recorded:    Sept 21 | 2016       Attend

    Over recent years, several organizations have suffered damaging data breaches where sensitive data was stolen. Alarmingly, things seem to be getting worse, and the results can be devastating. With the expanding threat landscape and the rise of the data-centric enterprise, companies must have parallel development of their security architecture to protect their sensitive data. But in the time it's taken for data security to catch up with the changing environment, organizations have found their compliance and data protection programs vulnerable.

  • Aug25tnThe GRC Evolution of Digital Enterprises with Convergence of ERM and Cybersecurity

    Recorded:    August 25 | 2016       Attend

    Cybersecurity has jumped to the top of companies’ risk agenda after a number of high profile data breaches, and other hacks. In an increasingly digitized world, where data resides in the cloud, on mobiles and Internet of Things enabling multitude of connected devices, the threat vectors are multiplying, threatening the firms’ operations and future financial stability.

  • Aug9TNDelivering Data Security with Hadoop and the IoT

    Recorded:    August 9 | 2016       Attend

    The Internet of Things (IoT) is here to stay, and Gartner predicts there will be over 26 billion connected devices by 2020. This is driving an explosion of data which offers tremendous opportunity for organizations to gain business value, and Hadoop has emerged as the key component to make sense of the data and realize the maximum value. On the flip side, the surge of new devices has increased the potential for hackers to wreak havoc, and Hadoop has been described as the biggest cybercrime bait ever created.

  • Live Webinar!How to Identify and Reduce the Risks of 3rd Party Vendors

    Recorded:    April 12 | 2016       Attend

    In a landscape filled with new threats and regulations managing the risks of 3rd party vendors is vitally important. Most financial institutions have tens of thousands of supplier relationships, and many data breaches originate through IT Vendors within the supply chain. Compounding this dilemma, regulators including OIG, OCC, FFIEC and others are increasing their focus on potential 3rd party risks. They want to see organizations proactively identifying potential risks, verifying that business partners providers and their employees are compliant, monitoring for changes that might create new risks or compliance gaps, and managing the investigation and remediation of incidents.

  • Live Webcast!Implementing a Risk Migration Plan for PCI DSS 3.1

    Recorded:    March 22 | 2016      Attend

    Under the rules of PCI DSS v3.1, SSL and early versions of the Transport Layer Security (TLS) protocol are no longer considered acceptable for payment data protection due to "inherent weaknesses" within the protocol. Organizations who process payments must migrate to TLS 1.1 encryption or higher by June 2018. Prior to this date, existing implementations using SSL and/or early TLS must have a formal risk mitigation and migration plan in place. Moreover, details have just been released on the upcoming PCI DSS 3.2.

  • PanelThreat and Vulnerability Management: A Key Enabler of an Organizations IT GRC Program

    Recorded:    February 24 | 2016       Attend

    In every organization, there are a multitude of applications and devices and a universe of threats and vulnerabilities. Every process, function and system has certain risks and compliance requirements. It is no longer enough to have a handful of diligent security and compliance professionals managing the organization's risk strategies and controls. Their processes must embrace business and mission professionals' knowledge of risk, who evaluate the causal impact of threats to their operational performance, and participate in decision-making to meet their risk posture goals.

  • PanelBest Practices to Prevent Data Breaches in 2016

    Recorded:    December 10 | 2015       Attend

    In 2014 around 40 percent of data breaches were the result of external intrusions, while the remainder were caused by a lack of internal controls/employee actions, lost or stolen devices/documents, and social engineering/fraud. The good news is that the vast majority of security breaches can be prevented by implementing and enforcing basic security best practices with proven technologies.

BT Login

Log in

Please Login to download this file

Username *
Password *
Remember Me

Create an account

Fields marked with an asterisk (*) are required.
Name *
Username *
Password *
Verify password *
Email *
Verify email *
Captcha *

ad-banner3

ad-banner3

MetricStream TPRM

CyberBanner

CyberBanner

ad-banner3

Go to top