REGISTER

email 14 48

120424

When:    January 15th | 2025      Attend

In the rapidly evolving digital landscape, the journey from Identity and Access Management (IAM) to a fully matured Identity and Access Governance solution is no longer a luxury - it’s a necessity.

21225

When:    February 12th | 2025      Attend

In a world surrounded by data, the interplay between identity management and data security has become paramount. This webinar will explore the concept of a layered approach to identity and data security, emphasizing its critical role in safeguarding sensitive information. We will examine how multiple layers - ranging from authentication to advanced identity lifecycle - work in tandem to create a robust security framework.

120424

Recorded:    December 4th | 2024      Watch

As cyber threats evolve, organizations must strengthen their defenses with a balanced cybersecurity approach, integrating people, processes, and technology. Yet, finding this balance is often challenging. Some focus on tech investments but lack the skilled personnel, while others have strong teams but lack strategic processes or advanced technology.

110724

Recorded:    November 20th | 2024      Watch

In today’s rapidly evolving digital landscape, protecting sensitive data is more challenging than ever. Data Security Posture Management (DSPM) offers organizations a proactive approach to safeguarding data by providing continuous visibility into security risks, vulnerabilities, and compliance gaps across diverse environments. This webinar will dive deep into the core principles of DSPM, exploring how organizations can effectively implement a comprehensive strategy to mitigate risks, maintain compliance, and secure their most valuable data assets.

110724

Recorded:    November 7th | 2024      Watch

In today's hyper connected digital landscape, organizations are heavily reliant on third-party partnerships to drive business growth and innovation. However, this dependency comes with significant risks. According to Gartner, breaches involving third parties cost 40% more than internal breaches, highlighting the critical need for robust Third-Party Risk Management (TPRM).

102324

Recorded:    October 23rd | 2024      Watch

In today's data-driven world, many companies struggle with data spread across various systems, leading to inefficiencies, poor data quality, and compliance risks. This session will delve into the role of a unified data repository in overcoming these challenges, offering a comprehensive approach to managing and securing organizational data. We will discuss how consolidating data into a single, well-governed source of truth can empower organizations to make more informed, timely, and compliant decisions.

091224

Recorded:    September 26th | 2024      Watch

The accelerated shift to the cloud as well as new PCI DSS 4.0 requirements coming into effect by March 2025, present several challenges for financial institutions, ecommerce merchants, and others subject to its regulations.

091224

Recorded:    September 25th | 2024      Watch

Join us as we delve into the critical challenges of protecting Active Directory (AD) environments from identity-based threats. As cybercriminals increasingly target identities and systems, it's essential for organizations to adapt by enhancing their detection, response, and mitigation strategies in real time. Protecting your key on-premises identity infrastructure — Active Directory — is crucial because it remains the backbone of many organizations' access control and authentication processes. When Active Directory is not secure, nothing is.

081524

Recorded:    August 15th | 2024      Watch

Navigating the complex landscape of software supply chain compliance is more critical than ever. With evolving legislative mandates and stringent mandatory requirements, staying compliant can seem daunting. This session will help teams cut through the red-tape by providing valuable insights into key legislative requirements and mandatory standards to ensure your organization is well-prepared to meet these challenges head-on, and attendees will:

062724

Recorded:    July 25th | 2024      Watch

Risk is a word that permeates every aspect of an organization’s GRC practices, and as businesses scale, the complexity of managing risks escalates.

062724

Recorded:    July 10th | 2024      Watch

As organizations increasingly adopt AI technologies like Microsoft Copilot, it is crucial to understand the associated security challenges. This session will provide valuable insights into the profound impact of modern technologies on IT environments and offer practical solutions to address the security risks involved.

062724

Recorded:    June 27th | 2024      Watch

Organizations expect to share 41% of critical data with third parties in the next five years, resulting in an exponential increase in vendor evaluation tasks. Ponemon research reveals that third parties spend an average of 15,000 hours annually on assessments, often characterized by length and redundancy.

53024

Recorded:    June 12th | 2024      Watch

Ready to unlock the full potential of Privileged Access Management (PAM)? Join us for an immersive webinar where we'll navigate the twists and turns of PAM deployment with expert precision.

53024

Recorded:    May 30th | 2024      Watch

Understanding the intricacies of nth party relationships is paramount for effective risk management. Optimizing risk classification in nth party relationships entails a multifaceted approach geared towards enhancing visibility, comprehending dependencies, and implementing proactive risk management strategies.

51524

Recorded:    May 15th | 2024      Watch

In today's fast-paced digital landscape, businesses face numerous challenges in achieving security, compliance, and operational efficiency.

42524

Recorded:    April 25th | 2024      Watch

Today, most security and IT teams are dealing with an attack surface that is exponentially larger than it used to be, and many organizations lack full visibility into their entire asset landscape. Networks often include hundreds or thousands of networking devices, security products, IoT devices, and connected OT systems; and businesses are relying more and more on third-party code and apps to get their work done.

32724

Recorded:    April 11th | 2024      Watch

In today's complex threat landscape, cyberattacks are inevitable. Malicious actors are becoming increasingly sophisticated, financially motivated attacks are becoming more widespread, and new malware families are being discovered daily, making it even more important for organizations — of all sizes and across industries — to have a plan of attack in place.

32724

Recorded:    March 27th | 2024      Watch

The clock is ticking on PCI DSS v3.2.1. On 31 March 2024, PCI DSS v3.2.1 will be retired, making the transition to PCI DSS v4.0 essential for organizations involved in payment data security.

31424

Recorded:    March 14th | 2024      Watch

In today's data-driven landscape, safeguarding sensitive information and mitigating the risk of data breaches and compliance violations is paramount. Organizations grapple with the ever-evolving challenges of managing data access while ensuring the utmost security for their vital data assets.

22924

Recorded:    February 29 | 2024      Watch

As technology continues to advance, the critical necessity of investing in robust cybersecurity measures becomes increasingly clear, ensuring the integrity of our digital society. On this webinar we will address the key components of cybersecurity risk management, understanding that organizations cannot eliminate all vulnerabilities but can prioritize and mitigate the most critical threats promptly.

21524

Recorded:    February 15 | 2024      Watch

Join us as we explore the latest advancements in securing software supply chains. As the digital landscape evolves, so do the threats to software integrity. The National Institute of Standards and Technology (NIST) has updated its guidelines to address these challenges, and this webinar will provide a comprehensive understanding of how to leverage NIST 2.0 for robust supply chain security.

101923p

Recorded:    January 18 | 2024      Watch

In today's interconnected business landscape, companies rely on third-party vendors and partners for various critical functions, but this dependence comes with inherent risks.

101923p

Recorded:    December 14 | 2023      Watch

In today's complex business landscape, effective Third-Party Governance, Risk Management, and Compliance (GRC) strategies are paramount for organizations seeking to thrive and maintain trust in the global marketplace.

111623p

Recorded:    November 16 | 2023      Watch

In today's rapidly evolving IT landscape, identity systems, especially Microsoft Active Directory (AD) used by over 90% of enterprises, are under consistent threat. As such, safeguarding identity systems is no longer an option; it's a necessity.

CyberBanner

MetricStream TPRM

CyberBanner

CyberBanner

CyberBanner

Log in Register

Please Login to download this file

Username *
Password *
Remember Me

CyberBanner

CyberBanner

CyberBanner

CyberBanner

Banner

CyberBanner

CyberBanner

CyberBanner

Banner

Go to top