CPE | Modernized IGA: 5 Game-Changing Capabilities You Won’t Find in Legacy Tools
- Details
-
Parent Category: Webinars:
-
Category: Information Security
Modernized IGA: 5 Game-Changing Capabilities You Won’t Find in Legacy Tools
When: January 21, 2026 Attend
Most IGA platforms were built for a world that no longer exists — one where access lived inside a single system and compliance meant annual reviews. Today, identity risks span multiple applications, evolve constantly, and require automation at every step.
Read more ...
NIST 2.0: Common Failures and Their Impact on Cybersecurity Resilience
- Details
-
Parent Category: Webinars:
-
Category: Information Security
NIST 2.0: Common Failures and Their Impact on Cybersecurity Resilience
Recorded: December 17 | 2025 Watch
This CPE webinar will explore real-world challenges in implementing the NIST Cybersecurity Framework 2.0 (CSF 2.0), examining their consequences and providing actionable strategies to strengthen cybersecurity resilience. Our panel will unpack the complexities of NIST 2.0, highlighting common pitfalls—from misaligned risk assessments and inadequate governance to weak supply chain risk management and inconsistent framework adoption.
Read more ...
Modern TPRM: Strategies for Securely Onboarding Vendor Software
- Details
-
Parent Category: Webinars:
-
Category: Risk Management
Modern TPRM: Strategies for Securely Onboarding Vendor Software
Recorded: December 4 | 2025 Watch
From malware-laced updates to vulnerable open-source dependencies, attackers are increasingly targeting the vendor software that enterprises rely on to operate their business. According to a recent Gartner survey on Third Party Risk Management, 83% of Cyber risk professionals find risks embedded within vendor applications after deployment.
Read more ...
Generative AI in Risk and Compliance: Insights from the 2025 Industry Report
- Details
-
Parent Category: Webinars:
-
Category: Risk Management
Generative AI in Risk and Compliance: Insights from the 2025 Industry Report
Recorded: November 12 | 2025 Watch
Despite billions invested, 95% of organizations see limited returns from generative AI. Our new research shows why: without elite risk management, firms cannot deploy this technology confidently or take the strategic risks that unlock true business value.
Read more ...
Generative AI Security: Preventing AI from Becoming a Data Breach Multiplier
- Details
-
Parent Category: Webinars:
-
Category: Information Security
Generative AI Security: Preventing AI from Becoming a Data Breach Multiplier
Recorded: November 5 | 2025 Watch
Generative AI tools are revolutionizing enterprise productivity, but they also introduce a new set of risks that IT GRC leaders must address head-on. Misclassified data, over-permissioned access, and uncontrolled sharing can cause AI systems to surface sensitive information to the wrong people. Without the right guardrails, the benefits of AI can quickly be overshadowed by data exposure, compliance violations, and governance gaps.
Read more ...
AgenticAI-Driven TPRM: Innovation, Risks, and Opportunities
- Details
-
Parent Category: Webinars:
-
Category: Risk Management
AgenticAI-Driven TPRM: Innovation, Risks, and Opportunities
Recorded: October 22 | 2025 Watch
As third-party risk management (TPRM) becomes more complex, AgenticAI is emerging as a powerful force reshaping how organizations identify, assess, and manage vendor risks. This session will examine the innovations AgenticAI brings to TPRM, the risks and challenges it introduces, and the opportunities it creates for building stronger, more resilient programs.
Read more ...
Zero Trust, Full Control: Tackling the Modern Identity Crisis in Data Security
- Details
-
Parent Category: Webinars:
-
Category: Access Management
Zero Trust, Full Control: Tackling the Modern Identity Crisis in Data Security
Recorded: September 10th | 2025 Watch
In today’s increasingly decentralized IT environments, organizations are facing a modern identity crisis—one where traditional perimeter-based security is no longer effective, and identity has become the new attack surface. As cloud adoption, remote work, and third-party access proliferate, the risk of overprivileged users, identity sprawl, and unauthorized access to sensitive data continues to grow.
Read more ...
Coordinating TPRM Efforts: A Multi-Departmental Approach
- Details
-
Parent Category: Webinars:
-
Category: Risk Management
Coordinating TPRM Efforts: A Multi-Departmental Approach
Recorded: August 14th | 2025 Watch
As third-party risk management (TPRM) programs mature, successful organizations are increasingly taking a cross-functional approach—aligning stakeholders from procurement, IT, legal, compliance, and risk to build a unified strategy. This CPE-accredited webinar brings together subject matter experts from ProcessUnity and OneTrust to explore best practices for breaking down departmental silos and fostering collaborative governance.
Read more ...
How to Stop Rubber-Stamping User Access Reviews within Regulated Applications
- Details
-
Parent Category: Webinars:
-
Category: Access Management
How to Stop Rubber-Stamping User Access Reviews within Regulated Applications
Recorded: July 10th | 2025 Watch
Most User Access Reviews (UARs), especially in SOX-scope applications and other regulated environments like SAP, Oracle, and Workday, are performed to meet compliance requirements — not because they drive meaningful security outcomes. They’re repetitive, rubber-stamped, and void of risk context.
Read more ...
Identity Governance 101: Reduce Costs & Strengthen Security
- Details
-
Parent Category: Webinars:
-
Category: Access Management
Identity Governance 101: Reduce Costs & Strengthen Security
Recorded: May 14th | 2025 Watch
Managing identity governance effectively is a critical challenge for organizations balancing cybersecurity, regulatory, and operational needs with budget constraints. Traditional identity governance and administration (IGA) projects often face high costs, lengthy deployment timelines, and complex integrations, making it difficult to achieve security and compliance objectives efficiently.
Read more ...
Critical Steps for a Secure and Resilient Software Supply Chain
- Details
-
Parent Category: Webinars:
-
Category: Risk Management
Critical Steps for a Secure and Resilient Software Supply Chain
Recorded: April 24th | 2025 Watch
Securing the software supply chain has become a mission-critical priority for organizations across industries. With increasing cyber threats targeting risks and threats in software development and delivery, businesses must adopt proactive strategies to safeguard their operations, ensure compliance, and maintain customer trust. Join us for an insightful webinar featuring Janet Worthington, a renowned Forrester analyst with extensive expertise in cybersecurity and software supply chain resilience.
Read more ...
Consolidating Risk Visibility to Build Business Efficiency & Resilience
- Details
-
Parent Category: Webinars:
-
Category: Risk Management
Consolidating Risk Visibility to Build Business Efficiency & Resilience
Recorded: March 27th | 2025 Watch
Today’s interconnected organizations face a rapidly evolving risk landscape where enterprise, cyber, operational, and third-party risks are increasingly intertwined. The growing reliance on critical IT systems, both internally managed and outsourced to third and fourth parties, has expanded the attack surface, leaving firms vulnerable to cyber incidents, downtime, and operational disruptions.
Read more ...
Fortifying the 3 Pillars of Cybersecurity: People, Processes, and Technology
- Details
-
Parent Category: Webinars:
-
Category: Information Security
Fortifying the 3 Pillars of Cybersecurity: People, Processes, and Technology
Recorded: December 4th | 2024 Watch
As cyber threats evolve, organizations must strengthen their defenses with a balanced cybersecurity approach, integrating people, processes, and technology. Yet, finding this balance is often challenging. Some focus on tech investments but lack the skilled personnel, while others have strong teams but lack strategic processes or advanced technology.
Read more ...
Enhancing Cybersecurity with Data Security Posture Management
- Details
-
Parent Category: Webinars:
-
Category: Information Security
Enhancing Cybersecurity with Data Security Posture Management
Recorded: November 20th | 2024 Watch
In today’s rapidly evolving digital landscape, protecting sensitive data is more challenging than ever. Data Security Posture Management (DSPM) offers organizations a proactive approach to safeguarding data by providing continuous visibility into security risks, vulnerabilities, and compliance gaps across diverse environments. This webinar will dive deep into the core principles of DSPM, exploring how organizations can effectively implement a comprehensive strategy to mitigate risks, maintain compliance, and secure their most valuable data assets.
Read more ...