REGISTER

Webinars:

111623p

Recorded:    November 16 | 2023      Watch

In today's rapidly evolving IT landscape, identity systems, especially Microsoft Active Directory (AD) used by over 90% of enterprises, are under consistent threat. As such, safeguarding identity systems is no longer an option; it's a necessity.

101923p

Recorded:    December 14 | 2023      Watch

In today's complex business landscape, effective Third-Party Governance, Risk Management, and Compliance (GRC) strategies are paramount for organizations seeking to thrive and maintain trust in the global marketplace.

31424

Recorded:    March 14th | 2024      Watch

In today's data-driven landscape, safeguarding sensitive information and mitigating the risk of data breaches and compliance violations is paramount. Organizations grapple with the ever-evolving challenges of managing data access while ensuring the utmost security for their vital data assets.

32724

When:    March 27th | 2024      Attend

The clock is ticking on PCI DSS v3.2.1. On 31 March 2024, PCI DSS v3.2.1 will be retired, making the transition to PCI DSS v4.0 essential for organizations involved in payment data security.

101923p

Recorded:    January 18 | 2024      Watch

In today's interconnected business landscape, companies rely on third-party vendors and partners for various critical functions, but this dependence comes with inherent risks.

51524

When:    May 15th | 2024      Watch

In today's fast-paced digital landscape, businesses face numerous challenges in achieving security, compliance, and operational efficiency.

073020tn

Recorded:    April 29 | 2021      Attend

Procurement, IT, and Compliance leaders struggle to manage today’s complex regulatory environment, expansive supply chains, and compliance burdens. Difficulties increase as organizations subject themselves to additional risk by involving more third parties—suppliers, sales agents, and even charities—as regulations grow ever-more complex.

21524

Recorded:    February 15 | 2024      Watch

Join us as we explore the latest advancements in securing software supply chains. As the digital landscape evolves, so do the threats to software integrity. The National Institute of Standards and Technology (NIST) has updated its guidelines to address these challenges, and this webinar will provide a comprehensive understanding of how to leverage NIST 2.0 for robust supply chain security.

42524

When:    April 25th | 2024      Attend

Today, most security and IT teams are dealing with an attack surface that is exponentially larger than it used to be, and many organizations lack full visibility into their entire asset landscape. Networks often include hundreds or thousands of networking devices, security products, IoT devices, and connected OT systems; and businesses are relying more and more on third-party code and apps to get their work done.

042320tn

Recorded:    April 23 | 2020      Attend

Companies work with third-party vendors to help them become leaner, more agile, flexible, and efficient, so they can go to market faster and beat the competition. However, onboarding remains the most time consuming and pressurized part of the process, as security leaders try to balance meeting the demands with the business with the fundamentals of good security. According to Gartner it now takes an average of 90 days to onboard a new vendor, 20 days longer than four years ago.

22924

Recorded:    February 29 | 2024      Watch

As technology continues to advance, the critical necessity of investing in robust cybersecurity measures becomes increasingly clear, ensuring the integrity of our digital society. On this webinar we will address the key components of cybersecurity risk management, understanding that organizations cannot eliminate all vulnerabilities but can prioritize and mitigate the most critical threats promptly.

32724

When:    April 11th | 2024      Attend

In today's complex threat landscape, cyberattacks are inevitable. Malicious actors are becoming increasingly sophisticated, financially motivated attacks are becoming more widespread, and new malware families are being discovered daily, making it even more important for organizations — of all sizes and across industries — to have a plan of attack in place.

052120tn

Recorded:    May 21 | 2020       Attend

Security practitioners around the world are struggling to cope with the challenges posed by remote workers during the COVID-19 pandemic. With all users working from home simultaneously, there is a tremendous load and increased security risks across private networks and the cloud. In light of more workers accessing data from the cloud, many organizations are taking a "zero trust" approach, including the use of solutions such as Privileged Access Management (PAM).

Log in

Please Login to download this file

Username *
Password *
Remember Me
Go to top