When: August 15th | 2024 Attend
Navigating the complex landscape of software supply chain compliance is more critical than ever. With evolving legislative mandates and stringent mandatory requirements, staying compliant can seem daunting. This session will help teams cut through the red-tape by providing valuable insights into key legislative requirements and mandatory standards to ensure your organization is well-prepared to meet these challenges head-on, and attendees will:
Recorded: July 25th | 2024 Watch
Risk is a word that permeates every aspect of an organization’s GRC practices, and as businesses scale, the complexity of managing risks escalates.
Recorded: July 10th | 2024 Watch
As organizations increasingly adopt AI technologies like Microsoft Copilot, it is crucial to understand the associated security challenges. This session will provide valuable insights into the profound impact of modern technologies on IT environments and offer practical solutions to address the security risks involved.
Recorded: June 27th | 2024 Watch
Organizations expect to share 41% of critical data with third parties in the next five years, resulting in an exponential increase in vendor evaluation tasks. Ponemon research reveals that third parties spend an average of 15,000 hours annually on assessments, often characterized by length and redundancy.
Recorded: June 12th | 2024 Watch
Ready to unlock the full potential of Privileged Access Management (PAM)? Join us for an immersive webinar where we'll navigate the twists and turns of PAM deployment with expert precision.
Recorded: May 30th | 2024 Watch
Understanding the intricacies of nth party relationships is paramount for effective risk management. Optimizing risk classification in nth party relationships entails a multifaceted approach geared towards enhancing visibility, comprehending dependencies, and implementing proactive risk management strategies.
Recorded: May 15th | 2024 Watch
In today's fast-paced digital landscape, businesses face numerous challenges in achieving security, compliance, and operational efficiency.
Recorded: April 25th | 2024 Watch
Today, most security and IT teams are dealing with an attack surface that is exponentially larger than it used to be, and many organizations lack full visibility into their entire asset landscape. Networks often include hundreds or thousands of networking devices, security products, IoT devices, and connected OT systems; and businesses are relying more and more on third-party code and apps to get their work done.
Recorded: April 11th | 2024 Watch
In today's complex threat landscape, cyberattacks are inevitable. Malicious actors are becoming increasingly sophisticated, financially motivated attacks are becoming more widespread, and new malware families are being discovered daily, making it even more important for organizations — of all sizes and across industries — to have a plan of attack in place.
Recorded: March 27th | 2024 Watch
The clock is ticking on PCI DSS v3.2.1. On 31 March 2024, PCI DSS v3.2.1 will be retired, making the transition to PCI DSS v4.0 essential for organizations involved in payment data security.
Recorded: March 14th | 2024 Watch
In today's data-driven landscape, safeguarding sensitive information and mitigating the risk of data breaches and compliance violations is paramount. Organizations grapple with the ever-evolving challenges of managing data access while ensuring the utmost security for their vital data assets.
Recorded: February 29 | 2024 Watch
As technology continues to advance, the critical necessity of investing in robust cybersecurity measures becomes increasingly clear, ensuring the integrity of our digital society. On this webinar we will address the key components of cybersecurity risk management, understanding that organizations cannot eliminate all vulnerabilities but can prioritize and mitigate the most critical threats promptly.
Recorded: February 15 | 2024 Watch
Join us as we explore the latest advancements in securing software supply chains. As the digital landscape evolves, so do the threats to software integrity. The National Institute of Standards and Technology (NIST) has updated its guidelines to address these challenges, and this webinar will provide a comprehensive understanding of how to leverage NIST 2.0 for robust supply chain security.
Recorded: January 18 | 2024 Watch
In today's interconnected business landscape, companies rely on third-party vendors and partners for various critical functions, but this dependence comes with inherent risks.
Recorded: December 14 | 2023 Watch
In today's complex business landscape, effective Third-Party Governance, Risk Management, and Compliance (GRC) strategies are paramount for organizations seeking to thrive and maintain trust in the global marketplace.
Recorded: November 16 | 2023 Watch
In today's rapidly evolving IT landscape, identity systems, especially Microsoft Active Directory (AD) used by over 90% of enterprises, are under consistent threat. As such, safeguarding identity systems is no longer an option; it's a necessity.
Recorded: Nov. 2 | 2023 Watch
Cybersecurity and compliance go hand in hand. In this webinar, we will delve into the latest cybersecurity disclosure rules mandated by the U.S. Securities and Exchange Commission (SEC) and explore how organizations can effectively navigate and comply with these regulations.
Recorded: Oct. 19 | 2023 Watch
In today's dynamic business landscape, effective risk management is essential for organizations to safeguard their assets, reputation, and long-term success.
Recorded: Oct. 5 | 2023 Watch
In today's interconnected business landscape, organizations heavily rely on third-party vendors, suppliers, and partners. While these collaborations offer numerous benefits, they also introduce potential risks and vulnerabilities that need to be proactively managed.
Recorded: Sept. 21 | 2023 Watch
In today's interconnected business landscape, managing risks associated with third-party relationships has become crucial for organizations across industries. Continuous Controls Monitoring (CCM) offers a proactive approach to monitor and mitigate risks by continuously evaluating controls and compliance measures.
Recorded: Sept. 7 | 2023 Watch
This is an exclusive immersive workshop, where you'll have the opportunity to explore various critical security aspects, such as safeguarding against insider threats, preventing unauthorized access, and eliminating local admin rights.
When: August 24 | 2023 Watch
Ransomware attacks have become more frequent and sophisticated, causing significant damage and financial loss to businesses of all sizes. According to Verizon’s 2022 data breach report, ransomware attacks saw a 13% increase in the past five years. The first half of 2022 saw nearly 236.7 million ransomware attacks worldwide, and the average cost of a ransomware attack was $1.85 million.
When: August 10 | 2023 Watch
Are you looking for effective strategies and tactics to improve group and identity management within your organization? Join us for an insightful webinar tailored specifically to address the challenges faced by IT professionals. In this webinar, we will explore best practices and techniques that enhance security, compliance, and efficiency in group and identity management.
Recorded: July 27 | 2023 Watch
In today's digital landscape, effective communication is crucial for ensuring cybersecurity across organizations. However, conveying cybersecurity concerns to both executives and employees can be a daunting task.