REGISTER

email 14 48

22924

When:    February 29 | 2024      Attend

As technology continues to advance, the critical necessity of investing in robust cybersecurity measures becomes increasingly clear, ensuring the integrity of our digital society. On this webinar we will address the key components of cybersecurity risk management, understanding that organizations cannot eliminate all vulnerabilities but can prioritize and mitigate the most critical threats promptly.

31424

When:    March 14th | 2024      Attend

In today's data-driven landscape, safeguarding sensitive information and mitigating the risk of data breaches and compliance violations is paramount.

32724

When:    March 27th | 2024      Attend

The clock is ticking on PCI DSS v3.2.1. On 31 March 2024, PCI DSS v3.2.1 will be retired, making the transition to PCI DSS v4.0 essential for organizations involved in payment data security.

101923p

Recorded:    January 18 | 2024      Watch

In today's interconnected business landscape, companies rely on third-party vendors and partners for various critical functions, but this dependence comes with inherent risks.

21524

Recorded:    February 15 | 2024      Watch

Join us as we explore the latest advancements in securing software supply chains. As the digital landscape evolves, so do the threats to software integrity. The National Institute of Standards and Technology (NIST) has updated its guidelines to address these challenges, and this webinar will provide a comprehensive understanding of how to leverage NIST 2.0 for robust supply chain security.

101923p

Recorded:    December 14 | 2023      Watch

In today's complex business landscape, effective Third-Party Governance, Risk Management, and Compliance (GRC) strategies are paramount for organizations seeking to thrive and maintain trust in the global marketplace.

111623p

Recorded:    November 16 | 2023      Watch

In today's rapidly evolving IT landscape, identity systems, especially Microsoft Active Directory (AD) used by over 90% of enterprises, are under consistent threat. As such, safeguarding identity systems is no longer an option; it's a necessity.

101923p

Recorded:    Nov. 2 | 2023      Watch

Cybersecurity and compliance go hand in hand. In this webinar, we will delve into the latest cybersecurity disclosure rules mandated by the U.S. Securities and Exchange Commission (SEC) and explore how organizations can effectively navigate and comply with these regulations.

101923p

Recorded:    Oct. 19 | 2023      Watch

In today's dynamic business landscape, effective risk management is essential for organizations to safeguard their assets, reputation, and long-term success.

072723p

Recorded:    Oct. 5 | 2023      Watch

In today's interconnected business landscape, organizations heavily rely on third-party vendors, suppliers, and partners. While these collaborations offer numerous benefits, they also introduce potential risks and vulnerabilities that need to be proactively managed.

072723p

Recorded:    Sept. 21 | 2023      Watch

In today's interconnected business landscape, managing risks associated with third-party relationships has become crucial for organizations across industries. Continuous Controls Monitoring (CCM) offers a proactive approach to monitor and mitigate risks by continuously evaluating controls and compliance measures.

072723p

Recorded:    Sept. 7 | 2023      Watch

This is an exclusive immersive workshop, where you'll have the opportunity to explore various critical security aspects, such as safeguarding against insider threats, preventing unauthorized access, and eliminating local admin rights.

072723p

When:    August 24 | 2023      Watch

Ransomware attacks have become more frequent and sophisticated, causing significant damage and financial loss to businesses of all sizes. According to Verizon’s 2022 data breach report, ransomware attacks saw a 13% increase in the past five years. The first half of 2022 saw nearly 236.7 million ransomware attacks worldwide, and the average cost of a ransomware attack was $1.85 million.

081023tn

When:    August 10 | 2023      Watch

Are you looking for effective strategies and tactics to improve group and identity management within your organization? Join us for an insightful webinar tailored specifically to address the challenges faced by IT professionals. In this webinar, we will explore best practices and techniques that enhance security, compliance, and efficiency in group and identity management.

072723p

Recorded:    July 27 | 2023      Watch

In today's digital landscape, effective communication is crucial for ensuring cybersecurity across organizations. However, conveying cybersecurity concerns to both executives and employees can be a daunting task.

Recorded:    July 13 | 2023      Watch

Third-party incidents can occur at any time and can lead to significant disruptions in business operations. Traditional methods of managing third-party security risk are lagging behind the reality of today's threat landscape. By building future proofed supplier risk management practices, you can dramatically lessen the time it takes to onboard new suppliers, while simultaneously reducing organizational security risk to an acceptable level.

032422TN

Recorded:    June 22 | 2023      Watch

Prepare to be captivated as Brian Johnson, a skilled white-hat hacker, embarks on a daring mission to infiltrate privileged accounts, with intentions ranging from illicit data acquisition to espionage and disruption of critical systems. The burning question lingers: Will he succeed in his audacious endeavors?

032422TN

Recorded:    June 1 | 2023      Attend

Third-party risk management (TPRM) is a crucial aspect of any organization's overall risk management strategy. With the increasing reliance on third-party vendors, contractors, and service providers, it's more important than ever to understand the risks associated with these relationships and take steps to mitigate them.

051823TN

Recorded:    May 18 | 2023     Watch

In today's digital world, data access governance has become a crucial aspect of protecting sensitive information. Organizations are facing increasing challenges when it comes to managing data access and ensuring the security of their critical data. Join our upcoming webinar to learn about best practices for data access governance and how Netwrix solutions can help simplify this task.

032422TN

Recorded:    April 20 | 2023      Watch

The National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF) is one of the leading frameworks for private and public sector cybersecurity maintenance and used by organizations of all sizes. The Framework helps to secure information systems and guide key decision points about risk management activities through the various levels of an organization from senior executives, to business and process level, and operations.

032422TN

Recorded:    March 16 | 2023      Watch

Cybersecurity is one of the largest concerns facing businesses today and hackers continuously develop diverse ways of penetrating your cybersecurity defences. By adopting the mindset of a hacker, you can be one step ahead of malicious attacks and improve your cybersecurity infrastructure.

032422TN

Recorded:    March 30 | 2023      Watch

Active Directory controls access to critical systems and data for organizations around the world — but it is not always managed securely. That makes it a top target of attackers.

032422TN

Recorded:    February 16 | 2023      Watch Now

The cyber threat landscape grows exponentially each year. Third-party cyber data breaches like the Kaseya data breach, a cyberattack that affected over 1,500 organizations, have prompted regulators to raise cybersecurity standards. In the United States, the Biden Administration aims to improve nationwide cybersecurity with an executive order. The 100-day plan aims to modernize federal infrastructure, improve supply chain security, establish a cybersecurity review board and more.

032422TN

Recorded:    November 17 | 2022      Attend

In today’s interconnected world of rapid data exchange, GRC Controls impact each and every part of an organization’s cybersecurity posture.

MetricStream TPRM

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

Log in

Please Login to download this file

Username *
Password *
Remember Me

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

MetricStream TPRM

CyberBanner

Go to top