Hi [[ session.user.profile.firstName ]]

Governance, Risk, and Compliance

  • Date
  • Rating
  • Views
  • [Earn CPE] Enabling GRC with Secure Authentication across the Digital Ecosystem
    [Earn CPE] Enabling GRC with Secure Authentication across the Digital Ecosystem
    Colin Whittaker, IRD; Richard Bird, Ping Identity; Teju Shyamsundar, Okta, Jerrod Chong, Yubico; and Andy Smith, Centrify. Recorded: Jun 11 2019 76 mins
    The days of securing a well-defined perimeter around your organization are gone. The cloud, mobile technologies, the internet of things (IoT) and diverse user groups freely exchange data across digital ecosystems, network and economies. This fluidity, however, means that organizations must secure access at multiple points throughout the organization, or risk letting in intruders seeking to hijack data.

    To manage the increasingly diverse digital landscape, IT and security managers need to move beyond usernames and passwords, and expand their use of multi-factor authentication (MFA) to help provide secure and convenient access to the critical data and systems users need. On this webinar our panel of experts will address how secure authentication can help enable GRC across the digital ecosystem, and they will share tips on:

    - Securing access at all points across applications, devices, users and environments.
    - Sharing insights across security systems to strengthen security.
    - Collecting and analyzing information to stop attacks.
    - How MFA can transform secure access—to any application, from any device, anywhere, at any time.
    - Strengthening identity assurance with privileged users.
  • Ask the AppSec Expert: How to Secure the Applications you Build, Buy & Manage
    Ask the AppSec Expert: How to Secure the Applications you Build, Buy & Manage
    Paul Farrington, Veracode | Yotam Gutman, Cybersecurity Marketing Community Recorded: Jun 6 2019 13 mins
    Tomorrow's businesses need a simpler and more scalable way to increase the resiliency of global application infrastructure, without slowing innovation, today.

    Join this interactive 1-2-1 discussion where EMEA Chief Technology Officer, Paul Farrington (CISSP, MBCS) will share how leading businesses are;

    - Improving the level of security awareness and addressing the skills deficit
    - Enabling developers to fix flaws and prevent new ones
    - Prioritising and triaging the most exploitable flaws
    - Automating application security
    - Providing software development leaders with really useful security metrics
    - Incentivising secure development as part of their culture

    This session will show you how architects and developers are making smarter choices in designing secure software. You will also learn how to report success, and investment justification, to the board whilst setting realistic expectations throughout the software development lifecycle and not just at the destination.
  • Livestream Video - Proactive Data Privacy and Security
    Livestream Video - Proactive Data Privacy and Security
    Steve Wright, Bank of England | Bill Mew, The Crisis Team | Ilias Chantzos, Symantec | Allan Boardman, ISACA Recorded: Jun 6 2019 45 mins
    How can enterprises shift from a reactive approach to privacy and data security to being proactive and closer to privacy-and-security-by-design? Join this panel of experts to get the answer to all of your privacy, security and compliance questions.

    Viewers can learn more about:
    - Effect of GDPR: One year later
    - How are enterprises instituting changes to achieve and maintain compliance
    - Challenges to achieving compliance in an IoT world
    - How to bake privacy and security into your processes
    - Best practices for data protection and privacy from the ground up

    Panellists
    Bill Mew, CEO,The Crisis Team
    Steve Wright, CISO & GDPR Advisor, Bank of England
    Ilias Chantzos, Senior Director, Government Affairs, Symantec

    Moderated by Allan Boardman, CGEIT Certification Committee Member, ISACA
  • Livestream Video - Application Security in a DevOps World
    Livestream Video - Application Security in a DevOps World
    Keith Batterham, DevSecOps Evangelist | Moshe Lerner, Checkmarx | Paul Farrington, Veracode | Yotam Gutman Recorded: Jun 6 2019 37 mins
    With today's enterprises leveraging around 1000 applications and multiple clouds, application security is becoming a key area of focus. Application security testing is being integrated into the DevOps process early on, while automation, speed and coverage and becoming critical to the success of DevSecOps programs.

    Join this interactive panel of industry experts to learn more about:
    - Why application security is critical
    - Key principles for building application security into DevOps
    - Best practices for leveraging automation
    - Speed vs Security: Where do you draw the line?
    - Recommendations for improving security in 2019

    Panellists
    Paul Farrington, EMEA CTO, Veracode
    Keith Batterham, CTO - CISO - DevSecOps Evangelist
    Moshe Lerner, SVP Product Strategy & Corporate Development, Checkmarx

    Moderated by Yotam Gutman, Founder & Community Manager, Cybersecurity Marketing Community
  • Ask the Data Management Expert: Security and Compliance in the Cloud
    Ask the Data Management Expert: Security and Compliance in the Cloud
    Nicolas Groh, Field CTO EMEA, Rubrik Recorded: Jun 6 2019 10 mins
    Join this interactive 1-2-1 discussion where Field Chief Technology Officer, Nicolas Groh will share;

    - Challenges businesses are facing today with regards to security and compliance in the cloud
    - Improvements that can be made today to ransomware prevention, detection, and recovery
    - Long-term security and compliance strategies
    - Quantifiable outcomes businesses can expect to see with a unified system of records

    Moderated by Paige Bidgood, EMEA Community Lead - IT Security & GRC, BrightTALK
  • Ask the Data Security Expert: How to Protect your Business in the Cloud
    Ask the Data Security Expert: How to Protect your Business in the Cloud
    Carl Leonard, Forcepoint | Raef Meeuwisse, ISACA Expert Speaker Recorded: Jun 5 2019 16 mins
    Cloud security is a key challenge for today's data-driven businesses.

    Join this interactive 1-2-1 discussion where Principal Security Analyst, Carl Leonard will share insights on;

    - What are the top cyber threats and trends to look out for in 2019?
    - Why are businesses continuing to suffer data breaches?
    - How are businesses securing themselves as they embrace digital transformation?
    - What is secure SD-WAN? Why is it increasingly important to businesses with distributed office locations?
    - What are the most important security solutions for businesses wishing to safely adopt cloud services?

    Moderated by Raef Meeuwisse, ISACA Expert Speaker and co-author of "How to Hack a Human: Cybersecurity for the Mind"
  • Livestream Video - Protecting Against Phishing, Ransomware & Social Engineering
    Livestream Video - Protecting Against Phishing, Ransomware & Social Engineering
    Raef Meeuwisse| Carl Leonard, Forcepoint | John Scott, Bank of England | Adenike Cosgrove, Proofpoint | Richard Agnew, Code42 Recorded: Jun 5 2019 47 mins
    External and internal threats continue to pose a challenge for security professionals worldwide. How are businesses preparing against attacks like phishing, ransomware, and social engineering?

    Join security experts from the industry to learn more about:
    - The most prevailing cyber threats businesses face in 2019
    - Lessons from cyber attacks and strategies for protecting against them
    - Solutions for faster breach detection and response
    - Why network visibility is key
    - Recommendations for improving enterprise security

    Panellists
    Richard Agnew, VP EMEA, Code42
    Carl Leonard, Principal Security Analyst, Forcepoint
    John Scott, Head of Security Education, Bank of England
    Adenike Cosgrove, Cybersecurity Strategist, Proofpoint

    Moderated by Raef Meeuwisse, ISACA Expert Speaker and co-author of "How to Hack a Human: Cybersecurity for the Mind"
  • Livestream Video - CISO Challenges and How to Solve Them
    Livestream Video - CISO Challenges and How to Solve Them
    Darren Thomson, Symantec | David Boda, Camelot Group | George Patsis, Obrela Security Industries | Martin Mackay, Proofpoint Recorded: Jun 5 2019 43 mins
    Today's CISO faces a myriad of challenges when it comes to securing the enterprise. From budgetary concerns and vendor confusion to dealing with the chronic lack of cyber talent, to addressing the disappearing security perimeter, CISOs are looking for ways to automate security operations and leverage AI to do more with existing teams and fewer tools.

    Join security experts across the industry for an interactive discussion on:
    - What keeps CISOs up at night
    - Strategies for breach prevention
    - Strategies for making the most of AI technology and human talent
    - Coping with analyst fatigue
    - Threats on the horizon
    - Recommendations for strengthening security

    Panellists
    David Boda, CISO, Camelot Group
    Darren Thomson, CTO - EMEA, Symantec
    George Patsis, CEO, Obrela Security Industries
    Martin Mackay, Senior Vice President - EMEA, Proofpoint

    Moderated by Yotam Gutman, Founder & Community Manager, Cybersecurity Marketing Community
  • Ask the Cyber Expert: How to Manage Cyber Exposure, Risks and Compliance
    Ask the Cyber Expert: How to Manage Cyber Exposure, Risks and Compliance
    George Patsis, Obrela Security Industries | Yotam Gutman, Cybersecurity Marketing Community Recorded: Jun 5 2019 13 mins
    Join this interactive 1-2-1 discussion where information security expert, George Patsis will share how to;

    - Align cybersecurity function with organisational and business strategy
    - Meet regulatory and compliance requirements
    - Deal with breaches in an ever-changing technology landscape
    - Create valuable reports

    During this session, you will learn how to identify, predict and prevent cyber threats, in real time.

    Moderated by Yotam Gutman, Founder & Community Manager, Cybersecurity Marketing Community
  • Live Interview: Importance of Building a People Centric Cybersecurity Strategy
    Live Interview: Importance of Building a People Centric Cybersecurity Strategy
    Martin Mackay, Senior Vice President, EMEA Recorded: Jun 5 2019 16 mins
    More than 99% of all targeted cyberattacks rely on users to activate them. It is evident that people need to be at the centre when building a robust cybersecurity strategy in the era of highly sophisticated attacks.

    Join our EVP, EMEA, Martin MacKay at this live interview as he discusses key findings from the threat landscape and gives some practical tips on how CISOs can build a truly people-centric security strategy.

    We'll discuss:
    - Today's most notorious cyber threats and trends.
    - How the attackers are changing tactics to target specific people in your organisation and how to protect against these threats.
    - CISO's role in changing company culture towards security risks and awareness and some tips on changing user behaviour to reduce risk.

Embed in website or blog