Hi [[ session.user.profile.firstName ]]

Lockpath

  • Date
  • Rating
  • Views
  • [Earn 1 CPE] Implementing a NIST Framework for Adaptive Cybersecurity
    [Earn 1 CPE] Implementing a NIST Framework for Adaptive Cybersecurity
    Colin Whittaker, with Sam Abadir, Lockpath; Allan Liska, Recorded Future; and Gina Mahin, Lynx TP; David McNeely, Centrify Recorded: Mar 21 2019 79 mins
    In an age where cybersecurity threats are an everyday fact of life, organizations are looking for solutions that enable them to predict, prepare and react to the shifting landscape of cyber threats, and implementation of adaptive cyber security strategies is becoming inevitable to achieve that goal.

    Adaptive cyber security methods allow for the simultaneous defense of multiple attack surfaces against this new wave of advanced cyber attacks targeting businesses and services. The NIST Cybersecurity Framework enables organizations — regardless of size, degree of cybersecurity risk, or cybersecurity sophistication — to apply the principles and best practices of risk management to improving security. Attend this CPE webinar to gain insights on:

    - Getting a clear picture of the current health of your organizations' defenses
    - Defining your security road map using NIST CSF as a framework
    - Conducting gap analysis and executing remediation actions
    - Mapping the NIST CSF with security controls and built-in reporting templates that align with the framework.
  • Configuration Compliance Management for 2020 and Beyond
    Configuration Compliance Management for 2020 and Beyond
    Sam Abadir, Lockpath Recorded: Mar 20 2019 40 mins
    Planning and managing for hardened, secure assets is a key requirement for managing IT Risk and is mandated by many compliance sources such as PCI, NIST, FISMA and HIPAA – yet many organizations are not fully assessing their IT hosts and applications for secure configuration. In this live webinar, Lockpath’s Sam Abadir will share what configuration compliance management for 2020 and beyond looks like, including:

    •What configuration compliance management encompasses
    •Who should care about secure configuration management
    •Why organizations are not doing this today and how this impacts the business beyond IT


    Discover the future for configuration compliance management by attending this educational webinar. Register now!
  • ISO Compliance
    ISO Compliance
    Lockpath Recorded: Mar 14 2019 3 mins
    ISO compliance can be tedious, labor-intensive and an on-going task of managing processes. Learn how the Keylight Platform is the solution you need for ISO compliance.
  • Third-Party Cloud Management
    Third-Party Cloud Management
    Sam Abadir, Vice President of Industry Solutions, Lockpath Recorded: Feb 28 2019 53 mins
    Cloud computing offers massive scalability, availability and low-cost services as major benefits, but as with most new technologies, it introduces new risks. Because there is so much opportunity in the cloud, the cloud service provider network is continuously growing. Service providers are using different technologies, different standards, and like all companies have different competency levels.

    A couple of the major challenges organizations have when using cloud computing is managing these third-party operational and security risks. As more technology is moved from your company’s infrastructure to cloud, understanding and management of these risks often overwhelms technology and procurement teams.

    This can be managed if an effective third-party framework is put into place, appropriately managed and cross-organizational guidelines are being followed.
  • IT Risk Management for 2020 and Beyond
    IT Risk Management for 2020 and Beyond
    Sam Abadir, Lockpath Recorded: Feb 21 2019 40 mins
    IT risk is always evolving, and in 2020 you need to be prepared what it may look like. New technologies and expanding trends such as cloud, digital transformation, and IT risk-related tasks being taken on directly by the business means IT risk will increase and potentially have greater impacts on the business without proper collaboration and management. Prepare for IT risk in 2020 and beyond by attending this live webinar led by Lockpath’s Sam Abadir. Topics to be discussed include:

    · Evolution of IT landscapes and what it means to IT risk management

    · IT risk management skillsets and disciplines

    · Collaboration across departments and building consensus

    · How organizational maturity impacts managing IT risk

    · How to sustain growth in 2020 and beyond



    Find out what you need to know to manage IT risk in 2020 and beyond by attending this educational webinar. Register now!
  • PCI DSS Compliance
    PCI DSS Compliance
    Lockpath Recorded: Feb 4 2019 2 mins
    Complying with PCI DSS (PCI) can be a burden on an organization. See how the Keylight Platform is the solution you need for PCI DSS compliance.
  • Risk Management for 2020 and Beyond
    Risk Management for 2020 and Beyond
    Sam Abadir, Lockpath Recorded: Jan 29 2019 50 mins
    Today’s fast-paced business environment demands efficiency and agility. Digital transformation and relying on third parties can streamline business processes and boost productivity, but they also bring new types of risk. As products and services grow in number and complexity, traditional risk management methods can’t adapt and scale to keep up. In this live webinar, Lockpath’s Sam Abadir will share what risk management for 2020 and beyond involves, including:

    -Critical capabilities for managing multiple types of risks

    -Strategies for tying risks to business objectives

    -Advantages of managing risk using a GRC platform

    -Leveraging the value chain for integrated risk management

    Discover the future for risk management by attending this educational webinar. Register now!
  • GDPR Compliance
    GDPR Compliance
    Lockpath Recorded: Jan 15 2019 2 mins
    GDPR compliance is a big challenge for organizations doing business with, or in the EU. See how the Keylight Platform is the solution you need for GDPR compliance.
  • The 7 Step Guide to Third-Party Risk Management
    The 7 Step Guide to Third-Party Risk Management
    Lockpath Recorded: Dec 27 2018 1 min
    A brief overview of what our guide to Third-Party Risk Management
  • GRC Buyer's Guide
    GRC Buyer's Guide
    Lockpath Recorded: Dec 27 2018 1 min
    Brief ad highlighting the benefits of the guide.

Embed in website or blog