Homepage Slideshow
Adapting 3rd Party Risk Management for Covid-19
Cybersecurity Tips for when Working from Home
Earn 1.5 CPE Credits on our December 17th webinar. Click above to confirm your seat!
Accelerating Threat Detection with Real-Time Security Intelligence
Click the slide above to watch on-demand!
A Third-Party Risk Management Masterclass
Watch now on-demand!
Privacy in a Pandemic: A Framework for Compliance
Watch now on-demand!
A Zero-Trust Approach to COVID-19
Click above to watch now on-demand!
Get a Birds Eye View of Your Digital Ecosystem
Now On-Demand! Click the slide above to view the recording.
Matching Threat Intelligence & Third-Party Risk
Now On-Demand!
Key Steps to Mature Your Third-Party Risk Management Program
Now On-Demand!
Preventing Data Breaches with a Scalable Verification Program
Now On-Demand!
Recorded: December 17 | 2020 Watch Now
Working From Home (WFH) is rapidly becoming the new norm, and cyber criminals across the globe are leveraging the panic induced by this pandemic to launch disruptive cyber-attacks. In the new WFH normal, you will have to secure every aspect of the architecture, whether it’s on premise hardware, cloud infrastructure or your employee’s endpoint devices. Any weakness in this entire chain will expose your IT infrastructure to security risks.
Recorded: November 19 | 2020 Watch Now
Cyberattacks can cost an organisation its reputation, its customers and a great deal of money, making CEOs and board members more accountable. Yet, research shows that a high percentage of corporate boards are not actively involved in cybersecurity oversight. Nonetheless, Gartner estimates by 2021, 100% of large enterprises will be asked to report to their board of directors on cybersecurity and technology risk at least annually.
Recorded: October 22 | 2020 Watch Now!
Many organizations rely on governance, risk, and compliance (GRC) technology to consolidate risk information from internal sources (such as finance, IT, and operations) and external sources to understand their threat landscape. Yet as vendor ecosystems grow in size and complexity, risk management teams are increasingly struggling to procure and maintain high-quality, real-time data to feed their GRC systems.
Recorded: September 24 | 2020 Watch Now!
Third-party risk management (TPRM) programs are designed to offload that risk, but the current approach isn’t providing the intended results. According to the Ponemon Institute, nearly 61% of U.S. companies have experienced a data breach caused by a third party.
Recorded: August 27 | 2020 Watch Now!
Under the weight of new and changing regulations around the world, many organizations struggle to achieve compliance. They often lack a holistic view of their compliance profile and face increasing challenges due to digital transformation. Chief Compliance Officers who take a top-down approach are often met with resistance, but a successful program requires management to actively participate, not just sign off.
Recorded: July 30 | 2020 Watch Now!
In response to the Coronavirus Pandemic, countries are turning to tech to find solutions for containing the spread of the virus. New government initiatives including contact tracing apps are being implemented at lightning speed, and tele-health regulation is being approved in days instead of years. The world is rapidly digitising in response to all users working from home simultaneously, companies are adding network technology to expand coverage and capability, and online video conferencing is exploding.
Recorded: July 15 | 2020 Watch Now!
In response to the COVID-19 pandemic, more employees are working from home than ever before, introducing corporate devices to a variety of new and evolving vulnerabilities. We recently examined the data we routinely collect from Internet traffic to learn more about how this unprecedented shift to remote work changed the security landscape — and the results were alarming.
Recorded: June 25 | 2020 View On-Demand
High-Profile Data Breaches have placed a spotlight on the risk of cyber security breaches with vendors and subcontractors, expanding the need to have greater rigor in third-party risk management and ongoing risk assessments. By integrating third-party risk management systems with other enterprise systems, external data sources, and analysis and reporting applications, and organization can deliver significant benefits and centralize processes into a single, automated platform that standardizes workflows and reduces manual effort.
Recorded: May 21 | 2020 View On-Demand
Security practitioners around the world are struggling to cope with the challenges posed by remote workers during the COVID-19 pandemic. With all users working from home simultaneously, there is a tremendous load and increased security risks across private networks and the cloud. In light of more workers accessing data from the cloud, many organizations are taking a "zero trust" approach, including the use of solutions such as Privileged Access Management (PAM).
Recorded: April 23 | 2020 View On-Demand
Companies work with third-party vendors to help them become leaner, more agile, flexible, and efficient, so they can go to market faster and beat the competition. However, onboarding remains the most time consuming and pressurized part of the process, as security leaders try to balance meeting the demands with the business with the fundamentals of good security. According to Gartner it now takes an average of 90 days to onboard a new vendor, 20 days longer than four years ago.
Recorded: March 26 | 2020 View On-Demand
In today's cybersecurity landscape, having continued visibility into your organization’s attack surface is essential to staying ahead of new and evolving threats. But as your digital ecosystem continues to expand, monitoring and mitigating cyber risk become increasingly difficult.
Recorded: March 12 | 2020 Attend
As organizations evolve and become more connected, their reliance on third-party ecosystems continues to grow. While these business relationships undoubtedly add value, they also introduce significant new risk and compliance challenges. The third-party risk management process is complex and involves more stakeholders and data sources than many people may think including: cyber risk information, supply chain, financial, IT, compliance, legal, and privacy risk data. But even with loads of available data, it’s extremely difficult for risk teams to know how to prioritize risk and focus remediation and response efforts without the proper context or processes.