Latest News


  • 072723pEmerging Trends & Best Practices to Combat Ransomware

    When:    August 24 | 2023      Watch

    Ransomware attacks have become more frequent and sophisticated, causing significant damage and financial loss to businesses of all sizes. According to Verizon’s 2022 data breach report, ransomware attacks saw a 13% increase in the past five years. The first half of 2022 saw nearly 236.7 million ransomware attacks worldwide, and the average cost of a ransomware attack was $1.85 million.

  • 072723pKey Steps to Implement Continuous Controls Monitoring for Third Parties

    Recorded:    Sept. 21 | 2023      Watch

    In today's interconnected business landscape, managing risks associated with third-party relationships has become crucial for organizations across industries. Continuous Controls Monitoring (CCM) offers a proactive approach to monitor and mitigate risks by continuously evaluating controls and compliance measures.

  • 072723pInteractive Cybersecurity Adventure: Exploring Privileged Access

    Recorded:    Sept. 7 | 2023      Watch

    This is an exclusive immersive workshop, where you'll have the opportunity to explore various critical security aspects, such as safeguarding against insider threats, preventing unauthorized access, and eliminating local admin rights.

  • 081023tnEnterprise Best Practices for Group and Identity Management

    When:    August 10 | 2023      Watch

    Are you looking for effective strategies and tactics to improve group and identity management within your organization? Join us for an insightful webinar tailored specifically to address the challenges faced by IT professionals. In this webinar, we will explore best practices and techniques that enhance security, compliance, and efficiency in group and identity management.

  • Innovating 3rd Party Security Risk Monitoring & Management

    Recorded:    July 13 | 2023      Watch

    Third-party incidents can occur at any time and can lead to significant disruptions in business operations. Traditional methods of managing third-party security risk are lagging behind the reality of today's threat landscape. By building future proofed supplier risk management practices, you can dramatically lessen the time it takes to onboard new suppliers, while simultaneously reducing organizational security risk to an acceptable level.

  • 072723pHow to Communicate Cybersecurity Concerns to Executives and Employees

    Recorded:    July 27 | 2023      Watch

    In today's digital landscape, effective communication is crucial for ensuring cybersecurity across organizations. However, conveying cybersecurity concerns to both executives and employees can be a daunting task.

  • 032422TNCyber Battle: Hacker vs Netwrix 

    Recorded:    June 22 | 2023      Watch

    Prepare to be captivated as Brian Johnson, a skilled white-hat hacker, embarks on a daring mission to infiltrate privileged accounts, with intentions ranging from illicit data acquisition to espionage and disruption of critical systems. The burning question lingers: Will he succeed in his audacious endeavors?

  • 032422TNTPRM Core Metrics to Track and How to Track Them

    Recorded:    June 1 | 2023      Watch

    Third-party risk management (TPRM) is a crucial aspect of any organization's overall risk management strategy. With the increasing reliance on third-party vendors, contractors, and service providers, it's more important than ever to understand the risks associated with these relationships and take steps to mitigate them.

  • 051823TNData Access Governance in the Digital Age

    Recorded:    May 18 | 2023     Watch

    In today's digital world, data access governance has become a crucial aspect of protecting sensitive information. Organizations are facing increasing challenges when it comes to managing data access and ensuring the security of their critical data. Join our upcoming webinar to learn about best practices for data access governance and how Netwrix solutions can help simplify this task.

  • 032422TNA Deep-Dive into TPRM & NIST Framework Integration

    Recorded:    April 20 | 2023      Watch

    The National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF) is one of the leading frameworks for private and public sector cybersecurity maintenance and used by organizations of all sizes. The Framework helps to secure information systems and guide key decision points about risk management activities through the various levels of an organization from senior executives, to business and process level, and operations.

  • 032422TN[Attack]tive Directory: How To Overcome Exploits and Prevent Attacks

    Recorded:    March 30 | 2023      Watch

    Active Directory controls access to critical systems and data for organizations around the world — but it is not always managed securely. That makes it a top target of attackers.

  • 032422TNThink Like a Hacker: Tactics to Identify Gaps in Your IT Security Posture

    Recorded:    March 16 | 2023      Watch

    Cybersecurity is one of the largest concerns facing businesses today and hackers continuously develop diverse ways of penetrating your cybersecurity defences. By adopting the mindset of a hacker, you can be one step ahead of malicious attacks and improve your cybersecurity infrastructure.






Log in

Please Login to download this file

Username *
Password *
Remember Me



MetricStream TPRM


MetricStream TPRM






Go to top