REGISTER

email 14 48

Latest News

On-Demand

  • 062724Unleashing the Potential of AI in Risk Management & Compliance

    Recorded:    July 25th | 2024      Watch

    Risk is a word that permeates every aspect of an organization’s GRC practices, and as businesses scale, the complexity of managing risks escalates.

  • 062724Overcoming the Challenges in Implementing AI in Your Audit Processes

    Recorded:    July 10th | 2024      Watch

    As organizations increasingly adopt AI technologies like Microsoft Copilot, it is crucial to understand the associated security challenges. This session will provide valuable insights into the profound impact of modern technologies on IT environments and offer practical solutions to address the security risks involved.

  • 062724Time is Money: Accelerating Vendor Risk Assessment Times with Exchanges

    Recorded:    June 27th | 2024      Watch

    Organizations expect to share 41% of critical data with third parties in the next five years, resulting in an exponential increase in vendor evaluation tasks. Ponemon research reveals that third parties spend an average of 15,000 hours annually on assessments, often characterized by length and redundancy.

  • 53024Unlocking PAM Power: A Roadmap to Deployment Success

    Recorded:    June 12th | 2024      Watch

    Ready to unlock the full potential of Privileged Access Management (PAM)? Join us for an immersive webinar where we'll navigate the twists and turns of PAM deployment with expert precision.

  • 53024Optimizing Risk Classification in Nth Party Relationships

    Recorded:    May 30th | 2024      Watch

    Understanding the intricacies of nth party relationships is paramount for effective risk management. Optimizing risk classification in nth party relationships entails a multifaceted approach geared towards enhancing visibility, comprehending dependencies, and implementing proactive risk management strategies.

  • 51524Unlocking the Potential of InfoSec & GRC Collaboration

    Recorded:    May 15th | 2024      Watch

    In today's fast-paced digital landscape, businesses face numerous challenges in achieving security, compliance, and operational efficiency.

  • 42524Fortifying Your Attack Surface: How to Defend Against Third-Party Risks

    Recorded:    April 25th | 2024      Watch

    Today, most security and IT teams are dealing with an attack surface that is exponentially larger than it used to be, and many organizations lack full visibility into their entire asset landscape. Networks often include hundreds or thousands of networking devices, security products, IoT devices, and connected OT systems; and businesses are relying more and more on third-party code and apps to get their work done.

  • 32724CISO Strategies to Manage Cyberattacks in the Age of Vulnerabilities

    Recorded:    April 11th | 2024      Watch

    In today's complex threat landscape, cyberattacks are inevitable. Malicious actors are becoming increasingly sophisticated, financially motivated attacks are becoming more widespread, and new malware families are being discovered daily, making it even more important for organizations — of all sizes and across industries — to have a plan of attack in place.

  • 32724Preparing for PCI DSS 4.0: What You Need to Know

    Recorded:    March 27th | 2024      Watch

    The clock is ticking on PCI DSS v3.2.1. On 31 March 2024, PCI DSS v3.2.1 will be retired, making the transition to PCI DSS v4.0 essential for organizations involved in payment data security.

  • 31424Ensuring Data Security with Former FBI Agent

    Recorded:    March 14th | 2024      Watch

    In today's data-driven landscape, safeguarding sensitive information and mitigating the risk of data breaches and compliance violations is paramount. Organizations grapple with the ever-evolving challenges of managing data access while ensuring the utmost security for their vital data assets.

  • 22924Cybersecurity 101: How to Manage IT Risk like a Pro

    Recorded:    February 29 | 2024      Watch

    As technology continues to advance, the critical necessity of investing in robust cybersecurity measures becomes increasingly clear, ensuring the integrity of our digital society. On this webinar we will address the key components of cybersecurity risk management, understanding that organizations cannot eliminate all vulnerabilities but can prioritize and mitigate the most critical threats promptly.

  • 21524Enhancing Software Supply Chain Security with NIST 2.0

    Recorded:    February 15 | 2024      Watch

    Join us as we explore the latest advancements in securing software supply chains. As the digital landscape evolves, so do the threats to software integrity. The National Institute of Standards and Technology (NIST) has updated its guidelines to address these challenges, and this webinar will provide a comprehensive understanding of how to leverage NIST 2.0 for robust supply chain security.

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

Log in

Please Login to download this file

Username *
Password *
Remember Me

CyberBanner

Banner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

Go to top