Latest Resources
-
Webinar
Evaluating Your Most Systemic Risk: Dysfunctional Risk Management Practices
Webinar produced by GRC World Forums in association with OneTrust
-
Webinar
2023 Cybersecurity Trends: Escalating Human Error Risks
Webinar produced by GRC World Forums in association with SoSafe
-
Video
The PrivSec Translator: What Can Data Protection and Data Security Departments Learn from Each Other?
The two disciplines have so much to teach each other, and compliance and operational demands require that they speak the same language.
-
Webinar
5 Automation Trends to Scale and Modernize Your InfoSec Compliance Program
Webinar produced by GRC World Forums in association with OneTrust
-
Webinar
Latest Cybercrime Trends: How Can Your Organization Protect Itself?
Webinar produced by GRC World Forums in association with SoSafe
-
Webinar
Leapfrog from SA&T compliance-as-a-strategy, to actual behavior & culture change
Security remains plagued with the legacy of compliance-driven, security awareness & training tools and methods.
-
Video
PrivSec Dublin 2022 highlights
PrivSec Dublin covered the most pressing and challenging topics from across the data protection, privacy and security sectors.
-
Webinar
Vendor Due Diligence: Best Practices for Scoping Assessments
With more and more vendors to onboard and monitor post-contract, third-party risk teams can struggleto keep up with the assessment workload. Ultimately, many organizations are asking too manyunnecessary questions or not enough necessary questions.
-
Webinar
Cybersecurity Threats: Know The Risks Your Third Parties Pose to Your Business and How to Defend Against Them
In 2021 alone there was a 62% global attack spike in ransomware, and it was made clear that the cyber threats are becoming not just more common, but also more sophisticated.
-
Webinar
After the attack: Mitigating Organisational Impact of a Data Breach? (LATAM region)
After the attack: Mitigating Organisational Impact of a Data Breach?
-
Video
The GRC Red Flag Series: G(P)RC - How GRC Drives Performance in Banking & Finance
Access the on-demand video for The GRC Red Flag Series with Michael Rasmussen: G(P)RC - How GRC Drives Performance in Banking & Finance
-
Webinar
The Human Element: Reducing Email Data Breaches By Combatting Human-Activated Risk
Did you know that 91% of cyberattacks are distributed by email and 82% of data breaches involve a human element?
-
Webinar
After the attack: There’s No Place for Guesswork in Cyber Attack Investigations (South Asia Edition)
You can’t ignore the headlines. We have seen that any organisation, at any time, can suffer a cybersecurity attack, resulting in a devastating data breach. It’s a question of “when” rather than “If”.
-
Webinar
Driving Accountability across the Organization with Cyber Risk Governance
Organisations are increasingly looking into setting a uniform standard for their cyber security programs that can sit across the entire structure. However, they first need to determine what standard is appropriate - and find a way to measure performance against it consistently.
-
Video
How to Manage Third-Party Risk in Your Supply Chain
Supply chain risks take many forms and can be devastating to your organisation if not properly mitigated. From cybersecurity to reputational and legal issues, managing risk among your vendors and other third parties can be a daunting task.
-
Video
Keeping Pace with Emerging Threats
Cyber criminals are leveraging innovative techniques and taking advantage of new security vulnerabilities. Organizations must evolve and adapt their defenses to protect against the next wave of cybersecurity threats.
-
Video
The human element: Fixing the behaviors that lead to breaches
Cybercriminals continue to launch increasingly sophisticated social engineering attacks. Coupled with a rise in human error, it’s no surprise that 85% of today’s security breaches involve a human element.
-
Video
Choosing the Right Cybersecurity Framework
Implementing a cybersecurity framework is a great way to improve your company’s security posture. But there are a lot of frameworks to choose from, and their suitability varies depending on your company’s industry, size and resources.
-
Video
How to Avoid Software Supply Chain Attacks
From Solarwinds to Kaseya to Log4j—the security risk from software supply chain attacks shows no sign of abating.
-