REGISTER

On-Demand

  • 032422TNData Privacy 101: Using Technology to Close the GRC Gap

    Recorded:    May 19 | 2022      Attend

    Data privacy continues to make headlines and be a concern for many organizations. According to a recent study by CNBC, 23.1% of the 39 CFOs see cyber-attacks as the number 1 external risk to their company.

  • 032422TNAligning Third-Party Risk Controls to Your Security Framework

    Recorded:    April 21 | 2022      Attend

    According to one study by Ponemon Research Institute, about 53% of organizations say they’ve had at least one third-party breach in the past two years with an average cost of $7.5 million dollars, and the majority of organizations still have immature third-party risk programs. As a result many organizations today are making deep investments into cybersecurity and implementing third-party risk assessment frameworks (such as NIST and ISO) to drive risk management and protect against constantly advancing cyber attacks.

  • 032422TNIncrease Your Cyber Resilience & Regain Control of Your Security Program

    Recorded:    April 7 | 2022      Attend

    Being a security professional has never been harder. The increasing threat environment, expanding attack surface, and continuous stakeholder demands for transparency are only adding to the challenges. It’s no wonder that Gartner’s latest report — “Predicts 2022: Cybersecurity” — states that cybersecurity leaders are “losing control” of decision making in an increasingly distributed ecosystem.

  • 032422TNCornerstones to Strengthen Your Third-Party Risk Management Program

    Recorded:    March 24 | 2022      Attend

    According to a recent survey by security vendor Anchore, 64% of businesses were affected by a supply chain attack in the past 12 months, and this year supplier attacks are expected to quadruple according to the European Union Agency for Cybersecurity. Third-party breaches can result in severe financial losses, downtime, loss of sensitive information, loss of reputation, breach of compliance, fines, and other legal liabilities.

  • 073020tnRansomware Attacks: Trends & Compliance Lessons Learned

    Recorded:    March 10 | 2022      Watch

    The average ransom fee requested increased from $5,000 in 2018 to around $200,000 in 2020*, and according to FBI Director Christopher Wray, reports of ransomware attacks have tripled over the past year. The increased frequency and scope of these attacks present not only a business risk for a company, but legal and compliance risks as well.

  • 073020tnInside the Mind of a Hacker

    Recorded:    February 24 | 2022      Watch

    How do hackers survey your company to identify gaps in your security program? Rachel Tobac executes these attacks for a living! But she's not a criminal, she's a white hat hacker -- launching successful social engineering attacks to train others on the up-to-date methods criminals use to gain access to your money, data, or systems, before the bad guys get there first.

  • 073020tnHow to Improve Threat Intelligence with Advanced Analytics

    Recorded:    February 3 | 2022      Watch

    Keeping track of cyber threats isn’t easy. The sheer volume of information threat researchers must sift through makes it difficult to collect, analyze, and research that data on time. The key to success is leveraging advanced analytics. It has been estimated that it would take 8,774 analysts working full time for a year to process the same amount of security event data that advanced analytics can process in that same time frame. Advanced analytics takes you from simply monitoring cyber security threats to active threat analytics, management, and prevention.

  • 073020tnGRC 101: Aligning Compliance, Security, and Business Goals

    Recorded:    December 16 | 2021      Watch

    Organizations today are tasked with meeting the challenges of the current business climate, one of which is managing GRC processes which are often siloed. GRC has a wide reach and impacts many departments across an organization, but when it is done right, benefits accrue. Organizations that integrate GRC processes and technology across departments can ensure the right people get the right information at the right times; that the right objectives are established; and that the right actions and controls are put in place to address uncertainty and act with integrity.

  • 073020tnParadigm Shift: Using NIST Cybersecurity Principles to Drive Your Risk Program

    Recorded:    November 16 | 2021      Watch

    Cybersecurity risks come in many forms, and most importantly, risks are evolving at an increasingly rapid pace. Organizations across industries should work to implement adaptive cybersecurity processes that enable them to predict, prepare and react to the shifting landscape of cyber threats. The NIST Cybersecurity Framework enables organizations to apply the principles and best practices of security to drive risk management and protect against constantly advancing cyber attacks.

  • 073020tnA Data-Driven Approach to Third-Party Risk Management

    Recorded:    October 21 | 2021      Watch

    As organizations have increased their scope of vendors and partners, they have also increased their digital risk surface and are facing new challenges regarding vendor risk management. By taking a data-driven approach to identifying, understanding, and acting on risk, you can efficiently eliminate your organization's most critical third-party security gaps.

  • 073020tnStrategies to Turn Risk into an Opportunity for Business Growth

    Recorded:    September 23 | 2021      Watch

    We are all in the risk business. No risk, no business. The biggest risk points are usually where the biggest opportunities lie to better meet your strategic objectives, enable and drive growth, improve reputation management and confidence in decision-making — and face fewer surprises.

  • 073020tnRansomware: How to Reduce Your Likelihood of Being a Victim

    Recorded:    September 16 | 2021      Watch

    Colonial Pipeline. JBS meat processor. Scripps Health. The list of recent high-profile ransomware victims is long and growing. So are the costs to recover from these crimes.

CyberBanner

Banner

CyberBanner

CyberBanner

CyberBanner

Log in

Please Login to download this file

Username *
Password *
Remember Me

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

Go to top