Hi [[ session.user.profile.firstName ]]

Governance, Risk, and Compliance

  • Date
  • Rating
  • Views
  • [Earn 1 CPE] Critical Actions to Prevent a Data Breach in 2019 and Beyond
    [Earn 1 CPE] Critical Actions to Prevent a Data Breach in 2019 and Beyond
    Panelists: Nick Hayes, Forrester; Idan Shoham, Hitachi-ID; Jason Bonds, Ping Identity; Perry Carpenter, KnowBe4 Recorded: Nov 29 2018 77 mins
    Today’s organizations face a cybersecurity landscape more difficult to navigate than ever before. When it comes to data breaches, the risk for organizations is high, from the easily calculable costs of notification and business loss to the less tangible effects on a company's brand and customer loyalty. With large-scale data breaches continuing to make the headlines in 2018, organizations must be proactive, not reactive, in the face of looming cyber threats. Proactive threat intelligence can enable organizations to prevent breaches or compromises before they occur.

    On this webinar our panel of experts will discuss some critical actions organisations can consider to prevent a data breach, and attendees will learn:

    - Strategies you can implement now to help you protect against a breach.
    - Best practices for gathering the intelligence to predict and prevent attacks.
    - How to use threat intelligence to improve your organization’s security posture and reduce the risk of an attack.
    - Steps to fortify your last line of defense.
  • The Next Big Thing? Cross-Border Privacy Basics in the Asia-Pacific Region
    The Next Big Thing? Cross-Border Privacy Basics in the Asia-Pacific Region
    Jesse Woo, Associate, Aleada Consulting Recorded: Nov 15 2018 43 mins
    This webinar will explain the background of the Asia Pacific Economic Cooperation Cross-Border Privacy Rules ("APEC CBPR") framework, who is participating, and how it works, as well as how it hopes to improve privacy protections while facilitating cross-border data flows.

    Join this webinar to learn about the recent and possible future developments with cross-border trade and privacy in Asia, such as the Comprehensive Progressive Trans-Pacific Partnership ("CPTPP") and Regional Comprehensive Economic Partnership ("RCEP") free trade agreements, both of which have e-commerce provisions addressing cross-border data. It will also talk about what companies should do if they want to participate in and benefit from this framework.
  • How to turn customer experience into customer trust
    How to turn customer experience into customer trust
    Louise Thorpe, Chief Privacy Officer, American Express Recorded: Nov 13 2018 62 mins
    Forrester found that only 11 percent of companies are able to deliver a customer experience (CX) that sets them apart from their competition. Without a CX that elevates the brand, companies are at risk of being left behind while customers choose to spend their purchase dollars or business investments elsewhere.

    There are four key ways to ensure that your CX is flawless and your market share keeps growing. It starts from the inside out, with a unified vision of CX; a strategy to solve problems fast while offering self-help; continuous, ongoing iteration and improvement of best practices, and a consistent, personalized experience in every way.

    To learn more about why CX has to be the core of your company and how to launch the strategy that ensures your company maintains competitive advantage, don’t miss this VB Live event!

    Register here for free.

    Webinar attendees will learn:
    * How to build trust with increasingly savvy consumers
    * Why brand reputation is your most important calling card -- and how to protect it
    * The key qualities customers look for in a trusted brand
    * The secrets of the modern customer-focused organization

    Speakers:
    * Louise Thorpe, Chief Privacy Officer, American Express
    * Andrew Leede, Product Owner, Blinker
    * Ting Ting Luo, Senior Product Marketing Manager, Docusign
    * Stewart Rogers, Analyst-at-Large, VentureBeat
    * Rachael Brownell, Moderator, VentureBeat

    Sponsored by Docusign
  • How to break a PCI Compliant Application
    How to break a PCI Compliant Application
    Amar Singh, Aatish Pattni, Karsten Desler Recorded: Oct 31 2018 58 mins
    ** Warning - This webinar is only for informational purposes. We do not condone or encourage any malicious activity. The knowledge you gain from this webinar should be used to protect your own infrastructure and web applications. **

    PCI-DSS needs no introduction. The Payment Card Industry Data Security Standard applies to any organisation accepting credit card details in some way or the other. This webinar is going to share some of the latest techniques cyber criminals are using to break web applications.

    Join us to learn how they are doing this and what you should do to protect your organisation and compliance status.
  • The PCI Dream Team on Achieving PCI Compliance in the Cloud
    The PCI Dream Team on Achieving PCI Compliance in the Cloud
    The PCI Dream Team: Ben Rothke | David Mundhenk | Arthur Cooper | Jeff Hall Recorded: Oct 26 2018 61 mins
    The PCI Dream is back for another Q&A round on all things PCI.

    Join this interactive session with some of the top PCI QSA’s in the country with decades of combined PCI and card processing experiences. They’ve seen it all: the good, bad and ugly; and lived to tell the tale.

    Ben Rothke, David Mundhenk, Arthur Cooper, and Jeff Hall will discuss how to achieve PCI compliance in the cloud. Get answers to your most vexing PCI questions. No PCI question is out of bounds.

    Speakers:
    - Ben Rothke, Senior Security Consultant at Nettitude
    - David Mundhenk, Senior Security Consultant at Herjavec Group
    - Jeff Hall, Principal Security Consultant at Optiv Security
    - Arthur Cooper "Coop", Senior Security Consultant at NuArx

    This is Part 5 of The PCI Dream Team Q&A on BrightTALK.

    The audience is highly encouraged to ask the team your toughest PCI questions.
  • Privacy & Security in the Age of IoT
    Privacy & Security in the Age of IoT
    Elena Elkina (Aleada Consulting ) | Parnian Najafi Borazjani (FireEye) | Ondrej Krehel (LIFARS) | John Bambenek (ThreatSTOP) Recorded: Oct 2 2018 61 mins
    This webinar is part of BrightTALK's Privacy Insights Series and National Cyber Security Awareness Month (NCSAM).

    With the proliferation of the Internet of Things into every sphere of our lives, it's now more important than ever to understand the security and privacy risks associated with connected devices. With smart home devices, office tools, children's toys, even medical devices being vulnerable to cyber attacks, becoming cyber aware should be a key priority for everyone.

    Join privacy and cyber security experts for an interactive panel roundtable discussion on:
    - The privacy and security vulnerabilities and risks stemming from IoT devices
    - The basic safety measures you can deploy to protect your home and workplace against cyber threats
    - Best practices for privacy and security safeguards
    - What to do in the event of a breach
    - What the future of privacy looks like

    Speakers:
    - Elena Elkina, Partner at Aleada Consulting
    - Parnian Najafi Borazjani, Senior Analyst, FireEye
    - Ondrej Krehel, Digital Forensics Lead, CEO & Founder, LIFARS
    - John Bambenek, VP Security Research & Intelligence, ThreatSTOP

    Audience members are encouraged to send questions to the speakers to be answered during the live session.
  • [Earn 1 CPE] Compliance vs Risk: Aligning Priorities & Prioritizing Threats
    [Earn 1 CPE] Compliance vs Risk: Aligning Priorities & Prioritizing Threats
    Colin Whittaker, Moderator. Stephen Boyer, CTO at BitSight; Marc French, SVP at Mimecast; Scott Petry, CEO at Authentic8. Recorded: Sep 27 2018 62 mins
    Compliance is a fundamental pillar to effective risk management at any company. However, simply complying with laws and regulations without considering the broader threat landscape can result in disaster. Certainly, a balance between compliance and risk is necessary. Ensuring compliance represents an organization's starting point, not the endgame, should be a priority.

    In a dynamic threat environment, forward-thinking organizations have concluded that the goal of total protection is elusive and that a risk-based approach to governance and management of cybersecurity is necessary. That is easier said than done, as the way most information security professionals measure risk today fails to quantify threats in terms the business can understand and use. In this CPE accredited webinar, our panel of experts will discuss:

    - Aligning risk and compliance metrics and controls across functional domains.
    - Benchmarking existing process for managing the risks identified by stakeholders.
    - Creating a transparent 'system of record' and collaborative process life-cycle management system.
    - Prioritizing control efforts accordingly.
    - Aligning compliance investments with compliance risk ratings and business priorities.
  • How to cross new frontiers with your subscription business
    How to cross new frontiers with your subscription business
    Patrick Unnold, VP Customer, Recurly and Luke Salinas, SVP Strategy, Adyen Recorded: Sep 12 2018 60 mins
    The subscription model is booming --subscription commerce grew more than 100 percent each year between 2011 and 2016, and the growth continues. Savvy companies are reaping the rewards: high recurring revenue that’s predictable paired with a competitive and sustainable business model. The potential ROI for global expansion is wide open, but many who try to take their subscription model global overlook important issues that can make or break success in new markets.

    Learn about the best practices to expand your subscription business into new countries including how to manage local payments, get the right partners on board, optimize authorization rates, tackle key challenges in potential markets, mitigate fraud, and more when you join this VB Live event!

    Register for free now.

    Webinar attendees will learn about:
    * The opportunities provided by the explosive subscription model growth around the globe
    * How to overcome regional challenges, including local payment methods, regulations, data security, and taxation
    * How to identify knowledgeable partners to accelerate your global expansion
    * How localized communications throughout the subscription lifecycle boost subscriber retention
    * Common fraud issues to anticipate and how to mitigate them

    Speakers:
    * Patrick Unnold, VP Customer, Recurly
    * Luke Salinas, SVP Strategy, Adyen
    * Lily Varon, Analyst, Forrester
    * Rachael Brownell, Moderator, VentureBeat

    Sponsored by: Recurly and Adyen
  • What Your Security Team Needs to Know about GDPR
    What Your Security Team Needs to Know about GDPR
    Richard Stiennon from IT-Harvest & Interfocus Technologies Recorded: Sep 12 2018 41 mins
    The scope of the 435 pages of the EU’s General Data Protection Regulation (GDPR) is vast and has raised the specter of excessive, unforeseen and unintended compliance consequences for companies around the world. In order to ensure individual privacy in the digital realm, there are numerous enterprise security requirements imposed by these regulations with significant compliance concerns, notification requirements and the potential for excessive penalties for non-compliance. Join Interfocus Technologies and security expert Richard Stiennon from IT-Harvest for an overview of GDPR’s implications on your security practices from a people, process and technology point of view. We will review the requirements for and processes to secure your endpoints, monitor and report on malicious user activity, and identify and trace where personal data resides in your network.
  • A Deep Dive into the 2018 State of IoT Security Report
    A Deep Dive into the 2018 State of IoT Security Report
    Vince Crisler, CEO of Dark Cubed Recorded: Sep 12 2018 33 mins
    Dark Cubed conducted extensive testing and determined that many IoT “smart home” device manufacturers have failed to implement basic security protections in the design, development, and production of their products such as electrical plugs, light bulbs and security cameras.

    Join CEO Vince Crisler for a live webcast as he discusses:

    · The creation and operation of the closed testing environment to simulate smart devices in a real-world home

    · The integration of Dark Cubed’s platform to capture and examine traffic patterns and message contents between each device, its back-end infrastructure and its Android app

    · Detailed port communications profiles, Nmap scan findings, infrastructure port reviews, man-in-the-middle assessments, Android app permissions and profiles, and privacy policy reviews for these light bulbs, cameras, and electrical outlets

    Learn more here: www.thestateofiotsecurity.com

Embed in website or blog