REGISTER

On-Demand

  • 073020tnRansomware: How to Reduce Your Likelihood of Being a Victim

    Recorded:    September 16 | 2021      Watch

    Colonial Pipeline. JBS meat processor. Scripps Health. The list of recent high-profile ransomware victims is long and growing. So are the costs to recover from these crimes.

  • 073020tnApplying Threat Intelligence to Improve Visibility into Third-Party Cyber Risks

    Recorded:    August 26 | 2021      Watch Now

    Data breaches are one of the world’s biggest cybersecurity threats for organizations of all sizes. A recent survey conducted by the Ponemon Institute revealed that 59% of organizations have experienced one or more data breaches caused by a third party, costing an average of $7.5 million to remediate. Incorporating current threat intelligence is critical to building and maintaining an effective third-party risk program.

  • 073020tnA Data-Driven Cybersecurity Masterclass

    Recorded:    July 22 | 2021       Watch Now

    Incident response teams, threat hunters and security operations centers need visibility into what’s happening on their networks so they can make sense of their traffic and move at the speed of attacks. Cybersecurity best practices have moved from protection to detection and response and the lens is refocusing again on data-driven security. Data is the key to making more informed, strategic cybersecurity decisions — and ensuring you’re spending your security dollars effectively. Continuous data-driven monitoring of security in your organization and in every vendor organization with access to your IT infrastructure is the only strategy that will keep you one step ahead of the bad guys.

  • 073020tnHow to Improve Efficiencies in Your Vendor Risk-Management Program

    Recorded:    June 24 | 2021      Watch Now

    Traditional Vendor Risk Management tactics are inadequate for understanding the cybersecurity posture of your vendor ecosystem. Your organization should also make sure that your program is efficient in its processes and works to enable business, mitigate risk, ensure compliance and that it fits into your organization’s overall structure. Whatever your company size and regardless of the number of vendors you have, creating efficiencies across your vendor risk management program isn’t just helpful—it’s critical if you want to properly assess the security posture of your vendors.

  • 073020tnACC Data Steward Program: A New Industry Model for Evaluating Law Firm Security

    Recorded:    June 17 | 2021      Watch Now

    Corporations give their law firms more sensitive information than any other type of vendor. Yet surveys show that 70% of companies do not assess the security of their firms and legal service providers.

  • 073020tnGDPR and Privacy 2021, where are we now?

    Recorded:    May 26 | 2021      Watch Now

    2021 is set to be an exciting one for privacy protection legislation as several notable privacy laws will begin enforcement, with several others falling in line to the new international standard set by the GDPR.

  • 073020tnThird-Party Risk Deep-Dive: How to Operate Your Program

    Recorded:    April 29 | 2021      Attend

    Procurement, IT, and Compliance leaders struggle to manage today’s complex regulatory environment, expansive supply chains, and compliance burdens. Difficulties increase as organizations subject themselves to additional risk by involving more third parties—suppliers, sales agents, and even charities—as regulations grow ever-more complex.

  • 073020tnAutomating Cyber Risk Management in a Pandemic

    Recorded:    March 25 | 2021      Attend

    Cyber-risk management has been forever changed by COVID-19. From the sudden and exponential growth of the remote workforce to the increase in cyber threats that exploit the expanding attack surface, the pandemic has created new challenges which require new strategies for effectively managing cyber risk. This paradigm shift has accelerated the demand for efficiency and forced a new mindset for risk and compliance teams who are relying on automation technologies like never before.

  • 073020tnApplying Threat Intelligence to Drive Control Assurance and Effectiveness

    Recorded:    February 25 | 2021      Attend

    The frequency and severity of security incidents has risen as cyber criminals continually adapt their methods of attack to maximize profit, from mass-market approaches, to compromising as many organizations as possible, to more sophisticated attacks that target specific companies. This is why building an IT security strategy that has data-driven threat intelligence (TI) at its core is so critical.

  • 073020tnHow to Adapt Third-Party Risk Management for Times of Disruption

    Recorded:    January 28 | 2021      Watch Now

    Last year, 59% of companies experienced a third-party data breach, and current global uncertainty is a reminder of the increasing complexity of managing third-party risk. Balancing the risks and benefits of using third parties to deliver business services has always been key and during a crisis, the risks can be significantly heightened.

  • 073020tnEnabling Agile Cloud Security for the Work From Home Enterprise

    Recorded:    December 17 | 2020       Watch Now

    Working From Home (WFH) is rapidly becoming the new norm, and cyber criminals across the globe are leveraging the panic induced by this pandemic to launch disruptive cyber-attacks. In the new WFH normal, you will have to secure every aspect of the architecture, whether it’s on premise hardware, cloud infrastructure or your employee’s endpoint devices. Any weakness in this entire chain will expose your IT infrastructure to security risks.

  • 073020tnExecutive Tips to Present Cybersecurity to the Board

    Recorded:    November 19 | 2020      Watch Now

    Cyberattacks can cost an organisation its reputation, its customers and a great deal of money, making CEOs and board members more accountable. Yet, research shows that a high percentage of corporate boards are not actively involved in cybersecurity oversight. Nonetheless, Gartner estimates by 2021, 100% of large enterprises will be asked to report to their board of directors on cybersecurity and technology risk at least annually.

CyberBanner

CyberBanner

Banner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

Log in

Please Login to download this file

Username *
Password *
Remember Me

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

Go to top