Hi [[ session.user.profile.firstName ]]

Governance, Risk, and Compliance

  • Date
  • Rating
  • Views
  • [Earn 1 CPE] Implementing a NIST Framework for Adaptive Cybersecurity
    [Earn 1 CPE] Implementing a NIST Framework for Adaptive Cybersecurity
    Colin Whittaker, with Sam Abadir, Lockpath; Allan Liska, Recorded Future; and Gina Mahin, Lynx TP; David McNeely, Centrify Recorded: Mar 21 2019 79 mins
    In an age where cybersecurity threats are an everyday fact of life, organizations are looking for solutions that enable them to predict, prepare and react to the shifting landscape of cyber threats, and implementation of adaptive cyber security strategies is becoming inevitable to achieve that goal.

    Adaptive cyber security methods allow for the simultaneous defense of multiple attack surfaces against this new wave of advanced cyber attacks targeting businesses and services. The NIST Cybersecurity Framework enables organizations — regardless of size, degree of cybersecurity risk, or cybersecurity sophistication — to apply the principles and best practices of risk management to improving security. Attend this CPE webinar to gain insights on:

    - Getting a clear picture of the current health of your organizations' defenses
    - Defining your security road map using NIST CSF as a framework
    - Conducting gap analysis and executing remediation actions
    - Mapping the NIST CSF with security controls and built-in reporting templates that align with the framework.
  • Demystifying Cyber for the Board and Beyond
    Demystifying Cyber for the Board and Beyond
    Griff James, Director, Damrod Analysis Ltd Recorded: Mar 19 2019 40 mins
    Successful security programs explain the situation, the risks, and the options available in a way that is both simple and true. Damrod draws on military analytical frameworks to develop map models that accurately depict the cyber terrain and guide the generation of a series of overlays. These build to create an Effects based plan suitable for Governance, Risk, and Compliance needs.

    Join this webinar for an introduction to the cyber-as-conflict model developed by Damrod.
  • [Earn 1 CPE] Revitalizing Access Control Programs: Intelligent Automation
    [Earn 1 CPE] Revitalizing Access Control Programs: Intelligent Automation
    Colin Whitaker, Informed Risk Decisions; Phil Shomura, Senior Product Manager, ACL Recorded: Mar 7 2019 64 mins
    Access control, a critical component of IT security compliance programs, ensures that organizations protect confidential information, like intellectual property and customer data. But your access management program can easily become outdated and static—especially if you rely on manual control testing and user access administration tasks.

    By using robotics and process automation, or RPA, you can tackle some of the common challenges associated with access control programs. RPA works 24/7, reduces human error, and saves employees from manual, repetitive tasks. RPA might be the key to advancing your access control program.

    Join this CPE webinar for insights into how you can reduce costs, increase efficiency and improve the effectiveness of your access control program with RPA. We will share:

    - How to get started with an access control program.
    - Ways to evaluate the right tools to automate processes at a task level, and align to your process automation strategy.
    - Practical steps you can take to see value from advanced analytics in risk management, compliance, and continuous monitoring programs.
    - How to embed governance, risk management, and controls into your enterprise’s mobilization and deployment of RPA, so you can catch issues before they arise.
  • Critical Actions to Prevent a Data Breach in 2019 and Beyond [Recording]
    Critical Actions to Prevent a Data Breach in 2019 and Beyond [Recording]
    Panelists: Nick Hayes, Forrester; Idan Shoham, Hitachi-ID; Jason Bonds, Ping Identity; Perry Carpenter, KnowBe4 Recorded: Feb 20 2019 76 mins
    * This is a recording so CPE credit is unavailable.

    Today’s organizations face a cybersecurity landscape more difficult to navigate than ever before. When it comes to data breaches, the risk for organizations is high, from the easily calculable costs of notification and business loss to the less tangible effects on a company's brand and customer loyalty. With large-scale data breaches continuing to make the headlines in 2018, organizations must be proactive, not reactive, in the face of looming cyber threats. Proactive threat intelligence can enable organizations to prevent breaches or compromises before they occur.

    On this webinar our panel of experts will discuss some critical actions organisations can consider to prevent a data breach, and attendees will learn:

    - Strategies you can implement now to help you protect against a breach.
    - Best practices for gathering the intelligence to predict and prevent attacks.
    - How to use threat intelligence to improve your organization’s security posture and reduce the risk of an attack.
    - Steps to fortify your last line of defense.
  • Favorite Talks, Topic Trends…The Inside Scoop on RSA Conference 2019
    Favorite Talks, Topic Trends…The Inside Scoop on RSA Conference 2019
    Britta Glade, Wendy Nather, Rich Mogull, Diana Kelley, Ryan Berg Recorded: Feb 7 2019 46 mins
    Join RSA Conference Director of Content Curation and four Program Committee Members for a panel discussion about the topics they’re most excited about at RSA Conference 2019. Plus, some hints at the big discussions to take place in areas like Blockchain, security strategy and more:

    * Is Blockchain bulletproof?
    * Are there technical risks related to cryptocurrencies?
    * How to assess the coverage and gaps in your security portfolio
    * The theme of “acceptance” in security strategy
    * Exciting sessions in our Hackers & Threats track from chipset to containers, as well as smart contracts
    * Closing the enterprise gaps when it comes to moving to the cloud

    You’ll have a chance to ask questions during this live webcast. Join us for this exclusive preview of what you’ll hear about at RSA Conference 2019, March 4-8 in San Francisco.

    Britta Glade, Director Content & Curation, RSA Conference
    Wendy Nather, Director, Advisory CISOs, Duo Security
    Rich Mogull, Analyst & CEO, Securosis
    Diana Kelley, Cybersecurity Field CTO, Microsoft
    Ryan Berg, Fellow, Alert Logic
  • Managing Compliance and Security in the Cloud
    Managing Compliance and Security in the Cloud
    Benny Czarny, Tzach Horowitz, Ariel Zeitlin, Diana Kelley Recorded: Jan 30 2019 43 mins
    "In the age of breaches, enterprises are looking to understand the security and compliance risks associated with data stored in, and accesible from, cloud applications so they can better prepare should the unthinkable happen. With data and workloads moving to the cloud, securing the enterprise is more critical than ever.

    Join cloud, security and compliance experts as they discuss:
    - How to proactively analyze security risk from the business perspective
    - What you need to know about your data, and how to ensure it is compliant when in the cloud
    - How to automate security policy changes
    - Top challenges for CISOs and CIOs
    - Achieving security and compliance across multiple clouds
    - Steps to take today"

    Presenters
    Benny Czarny, CEO and Founder, OPSWAT
    Tzach Horowitz, Pre-Sale Director, Cybergym
    Ariel Zeitlin, CTO and co-founder, Guardicore
    Diana Kelley, Cybersecurity Field CTO, Microsoft
  • Strategies for Cyber Resilience in 2019
    Strategies for Cyber Resilience in 2019
    Aviv Cohen, Eddy Bobritsky, Israel Levy, Ariel Koren Recorded: Jan 30 2019 50 mins
    With cyber attacks and breaches on the rise, cyber resilience is becoming an area of focus for C-suite executives worldwide. It is no longer a question of "if" a breach will occur, but "when," and organizations are looking to include cyber resilience as part of their business continuity and disaster recovery programs.

    Join security and business continuity experts as they review:
    - Threats to cyber resilience and business continuity
    - Lessons from Wannacry (ransomware) and NotPetya (wiper) attacks
    - Attack trends and business preparedness
    - Steps for enterprises to take today

    Panellists
    Aviv Cohen, CMO, Pcysys
    Ariel Koren, CTO, SNDBOX
    Israel Levy, CEO, Bufferzone Security
    Eddy Bobritsky, Founder & CEO, Minerva Labs
  • Top Challenges for CISOs and How to Solve Them
    Top Challenges for CISOs and How to Solve Them
    Aviv Grafi, Guy Dagan, Noam Erez, Kobi Freedman, Avivit Kotler Recorded: Jan 29 2019 46 mins
    According to a recent study, having a lack of influence in the boardroom is a key reason why 84% of CISOs in North America believe there is no way to avoid a data breach. How are CISOs addressing the ever-growing cyber threat landscape, disappearing security perimeter and the chronic lack of skilled security professionals? What do they need to communicate and how, to get the board on their side?

    Join security experts across the industry for an interactive discussion on:
    - What keeps CISOs up at night
    - Strategies for breach prevention
    - Strategies for making the most of AI technolofy and human talent
    - Coping with analyst fatugue
    - Threats on the horizon
    - Recommendations for strengthening security

    Panellists
    Noam Erez, co-founder and CEO, XM Cyber
    Aviv Grafi, CEO and co-founder, Votiro
    Guy Dagan, Cofounder and Partner, Consienta
    Avivit Kotler, CISO - Head of Cyber Security & Business Continuity, Clal Insurance
    Kobi Freedman, Co-founder & CEO, IDRRA
  • IoT Cyber Attacks and Proactive Security
    IoT Cyber Attacks and Proactive Security
    Moshe Shlisel, Udi Solomon, Ari Eitan, Guy Dagan Recorded: Jan 29 2019 56 mins
    The Internet of Things is set to reach 50 billion connected devices by 2020, according to a recent Cisco report, making them an attractive target for cyber criminals who can easily use them get inside networks of organizations worldwide. Once in, attackers can easily take over and control IP-enabled devices to extract data or implant malicious code.

    Join IoT and security experts to learn more about:
    - Unique challenges of securing IoT systems
    - IoT and AI: Threats, attack trends and recommendations for basic cyber hygiene
    - Proactive security strategies to stave off the threat of IoT cyber attacks

    Panellists
    Ari Eitan, VP of Research, Intezer
    Udi Solomon, CEO & Co-Founder, ShieldIoT
    Moshe Shlisel, CEO and Co-Founder, GuardKnox
    Guy Dagan, Cofounder and Partner, Consienta
  • Addressing the Cyber Threats on the Horizon
    Addressing the Cyber Threats on the Horizon
    Mille Gandelsman, Yoram Salinger, Guy Dagan, Elad Schulman, Kenneth Schneider Recorded: Jan 29 2019 41 mins
    Cyber threats continue to rise as organizations are embarking on their digital transformation journeys. The continued rise in cyber attacks is a key concern for CISOs in their efforts to protect the enterprise from financially motivated cyber criminals, as well as insider threats.

    Join security experts as they discuss:
    - New on the threat landscape
    - Notable cyber attack methods and strategies and how to protect against them
    - Areas for improvement
    - Solutions for network visibility, breach detection and response
    - Recommendations for improving security and steps to take today

    Panellists
    Elad Schulman, CEO, Segasec
    Yoram Salinger, CEO, Perception Point
    Mille Gandelsman, CTO and co-founder, Indegy
    Guy Dagan, Cofounder and Partner, Consienta
    Kenneth Schneider, VP Fellow, Symantec

Embed in website or blog