Latest Resources – Page 2
-
Video
PrivSec Dublin 2022 highlights
PrivSec Dublin covered the most pressing and challenging topics from across the data protection, privacy and security sectors.
-
Webinar
Vendor Due Diligence: Best Practices for Scoping Assessments
With more and more vendors to onboard and monitor post-contract, third-party risk teams can struggleto keep up with the assessment workload. Ultimately, many organizations are asking too manyunnecessary questions or not enough necessary questions.
-
Webinar
Cybersecurity Threats: Know The Risks Your Third Parties Pose to Your Business and How to Defend Against Them
In 2021 alone there was a 62% global attack spike in ransomware, and it was made clear that the cyber threats are becoming not just more common, but also more sophisticated.
-
Webinar
After the attack: Mitigating Organisational Impact of a Data Breach? (LATAM region)
After the attack: Mitigating Organisational Impact of a Data Breach?
-
Video
The GRC Red Flag Series: G(P)RC - How GRC Drives Performance in Banking & Finance
Access the on-demand video for The GRC Red Flag Series with Michael Rasmussen: G(P)RC - How GRC Drives Performance in Banking & Finance
-
Webinar
The Human Element: Reducing Email Data Breaches By Combatting Human-Activated Risk
Did you know that 91% of cyberattacks are distributed by email and 82% of data breaches involve a human element?
-
Webinar
After the attack: There’s No Place for Guesswork in Cyber Attack Investigations (South Asia Edition)
You can’t ignore the headlines. We have seen that any organisation, at any time, can suffer a cybersecurity attack, resulting in a devastating data breach. It’s a question of “when” rather than “If”.
-
Webinar
Driving Accountability across the Organization with Cyber Risk Governance
Organisations are increasingly looking into setting a uniform standard for their cyber security programs that can sit across the entire structure. However, they first need to determine what standard is appropriate - and find a way to measure performance against it consistently.
-
Video
How to Manage Third-Party Risk in Your Supply Chain
Supply chain risks take many forms and can be devastating to your organisation if not properly mitigated. From cybersecurity to reputational and legal issues, managing risk among your vendors and other third parties can be a daunting task.
-
Video
Keeping Pace with Emerging Threats
Cyber criminals are leveraging innovative techniques and taking advantage of new security vulnerabilities. Organizations must evolve and adapt their defenses to protect against the next wave of cybersecurity threats.
-
Video
The human element: Fixing the behaviors that lead to breaches
Cybercriminals continue to launch increasingly sophisticated social engineering attacks. Coupled with a rise in human error, it’s no surprise that 85% of today’s security breaches involve a human element.
-
Video
Choosing the Right Cybersecurity Framework
Implementing a cybersecurity framework is a great way to improve your company’s security posture. But there are a lot of frameworks to choose from, and their suitability varies depending on your company’s industry, size and resources.
-
Video
How to Avoid Software Supply Chain Attacks
From Solarwinds to Kaseya to Log4j—the security risk from software supply chain attacks shows no sign of abating.
-
-
Video
Why Effective Process and Governance is as Important as Technology When IAM issues arise
When IAM issues arise, organizations often lean too heavily on implementing technology with the idea that it will solve all issues related to identity and access.
-
Video
Digital Identity: Will We Ever See a World Without Passwords?
Even with good password management techniques, passwords are a flawed approach to account security. Many of the world’s major tech companies are proposing alternative mechanisms to verify identity and manage access. But what works best—and are there privacy trade-offs?
-
Video
Vendor Risk Management: Can You Trust Vendor Risk Questionnaires?
Vendor risk management questionnaires are often seen as a vital part of the TRPM due diligence process. But how far can you trust your vendors’ responses?
-
Webinar
After the attack: There’s No Place for Guesswork in Cyber Attack Investigations (Nordic Benelux region)
You can’t ignore the headlines. We have seen that any organisation, at any time, can suffer a cybersecurity attack, resulting in a devastating data breach. It’s a question of “when” rather than “If”
-
Video
Improving Organisational Resilience
PrivSec Risk in Focus will consider the best practices for managing overall organisational resilience and ask risk management experts what they’ve learned from the past few chaotic years.
-
Webinar
After the attack: There’s No Place for Guesswork in Cyber Attack Investigations (On-Demand)
You can’t ignore the headlines. We have seen that any organisation, at any time, can suffer a cybersecurity attack, resulting in a devastating data breach. It’s a question of “when” rather than “If”.