REGISTER

On-Demand

  • 032422TNStreamlining GRC Controls to Optimize Cybersecurity

    Recorded:    November 17 | 2022      Attend

    In today’s interconnected world of rapid data exchange, GRC Controls impact each and every part of an organization’s cybersecurity posture.

  • 032422TNData Privacy Essentials

    Recorded:    November 3 | 2022      Attend

    Data privacy is a key component in many strict regulatory mandates and a subject of increasing attention from the public at large. To avoid steep fines and attract and retain customers, organizations must ensure the privacy of all the sensitive data they process and store. But what's the best path to achieving that goal?

  • 032422TNEnriching Third-Party Risk Processes with Targeted Risk Intelligence

    Recorded:    October 20 | 2022      Attend

    With organizations having an average of over 5500 third parties in their vendor ecosystem, third-party risk management (TPRM) can be overwhelming and costly. Manual approaches to TPRM research and analysis are no longer appropriate. Targeted risk intelligence and automated data feeds can enable organizations to recognize risk sooner and respond with increased operational resilience, reducing the manual burden and cost.

  • 032422TNUnderstanding the Modern Attack Surface: IoT and Supply Chain Risk

    Recorded:    October 6 | 2022      Attend

    The corporate attack surface is rapidly expanding: how can security professionals get ahead of the curve and create resilient organizations?

  • 032422TNPreparing for Ransomware with the NIST Cybersecurity Framework

    Recorded:    September 22 | 2022      Attend

    Ransomware is a type of malicious attack where attackers encrypt an organization’s data and demand payment to restore access. It disrupts or halts an organization’s operations and poses a dilemma for management: pay the ransom and hope that the attackers keep their word about restoring access and not disclosing data, or do not pay the ransom and restore operations themselves. The methods used to gain access to an organization’s information and systems are common to cyberattacks more broadly, but they are aimed at forcing a ransom to bepaid.

  • 032422TNUtilizing the NIST Framework for Full-Cycle Privilege Orchestration

    Recorded:    September 8 | 2022      Attend

    A huge percentage of data breaches start with privileged credential abuse. There are often many privileged accounts that today’s overburdened IT security teams lose track of them. Stop leaving privileged accounts available for attackers to compromise and insiders to misuse! Instead, discover and remove them to achieve zero standing privilege (ZSP).

  • 032422TNHow to Effectively Communicate Cybersecurity Risks to the Board

    Recorded:    August 25 | 2022      Attend

    It has always been challenging for security leaders to communicate the value of cybersecurity investments to board. Giving transparency about the weakness of organizations can be pretty uncomfortable but, it is essential to increase the Cybersecurity level. As an IT Manager, CISO, or CSO, your understanding of risk and compliance is intimate and understood in infosec terminology. You must offer board executives a set of data to help them make informed decisions based upon the optimal management.

  • 032422TNTop Regulatory & Compliance Trends Impacting Risk Management

    Recorded:    July 28 | 2022      Attend

    The COVID-19 pandemic and increased geopolitical uncertainty has placed new priorities and responsibilities on the shoulders of risk and compliance professionals. Executives have realized that stronger ERM programs are required to remain competitive in this new era. Risk leaders, in turn, are looking beyond the urgent ERM measures required to handle the pandemic to how an effective enterprise risk management program can be a competitive differentiator for their companies.

  • 032422TNCyber Risk Quantification: Turning the Dream into Reality

    Recorded:    July 14 | 2022      Attend

    Cyber Risk Quantification can help CISOs financially quantify risk for senior executives, identify program gaps, and prioritize areas for improvement. Unfortunately, despite the obvious benefits, many CISOs are struggling to implement cyber risk quantification (CRQ)

  • 032422TNOptimizing Controls to Mitigate Cybersecurity Risks

    Recorded:    June 23 | 2022      Attend

    No matter how mature a cybersecurity program is, there always remains room for improvement. Digital transformation continually expands the scope of IT processes, and organizations continue to grapple with resource, staffing, and skill challenges.

  • 032422TNData Privacy 101: Using Technology to Close the GRC Gap

    Recorded:    May 19 | 2022      Attend

    Data privacy continues to make headlines and be a concern for many organizations. According to a recent study by CNBC, 23.1% of the 39 CFOs see cyber-attacks as the number 1 external risk to their company.

  • 032422TNAligning Third-Party Risk Controls to Your Security Framework

    Recorded:    April 21 | 2022      Attend

    According to one study by Ponemon Research Institute, about 53% of organizations say they’ve had at least one third-party breach in the past two years with an average cost of $7.5 million dollars, and the majority of organizations still have immature third-party risk programs. As a result many organizations today are making deep investments into cybersecurity and implementing third-party risk assessment frameworks (such as NIST and ISO) to drive risk management and protect against constantly advancing cyber attacks.

MEN21

CyberBanner

Banner

CyberBanner

CyberBanner

CyberBanner

Log in

Please Login to download this file

Username *
Password *
Remember Me

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

Go to top