Latest Resources – Page 5
-
Podcast
Microsoft Podcast: Manage risk with intelligent data protection and compliance solutions
During this podcast, our subject matter experts will discuss the biggest concerns for today’s CIOs, CISOs and DPOs and they will explore the best ways to protect data, mitigate risk, and address compliance regulations in this new reality.
-
Video
GRC TV: Securing Digital Transformation & Security Threats
Access this episode on demand, as we delve into on the current landscape of cyber security with Ciaran Martin, plus how to secure your digital transformation with strong security.
-
Webinar
Do You Know What Your Ransomware Readiness Score Is?
It’s not a matter of if, but when. Ransomware incidents are on the rise and it is crippling companies. But there are key things you can and should be doing to prevent and recover in the event of a ransomware attack.
-
Video
GRCTV: The cyber fraud epidemic & app store scams
Access this episode on demand, as we delve into how the pandemic created a cyber fraud epidemic and we chat with the man poking holes in Apple’s app store and the multi-million dollar scams operating on within the app store.
-
Video
GRCTV: How to succeed as a security leader & the top security considerations in a digital nomad era
Access this episode on demand, as we explored how to succeed as a security leader and also look at the top security considerations in a digital nomad era.
-
ebook
Has O365 closed the door to data leaks?
Efficiency, collaboration and security are often the positive messages in regards to implementing Office365 in any organisation. But, is your organisation truly experiencing the comfort of safe communication?
-
ebook
OneTrust GRC: Steering Your IT Risk Management Program
Cybersecurity in line with IT risk management is important for both your internal and external GRC execution. Forrester, a world-wide research and advisory firm, recently surveyed CEO’s to produce a new report, The Biggest Trends Shaping Enterprise Risk Management.
-
Video
A Fireside Chat with Johnny Ryan
Johnny Ryan, Author, Senior Fellow at Irish Council for Civil Liberties, and Open Markets Institute. Self proclaimed sufferer of “adtech remorse”.
-
Video
How do we Address the Large Skills Gap Across our Organisations when it comes to Emerging Technology Risk and Security?
This is one of the key challenges facing Boards and C-Suites globally; this panel will look at the options when it comes to upskilling your teams, what is the nature of upskilling and how do you put such methods into practice.
-
Video
Building Security Teams panel: The Increasing Importance of DEI in the Recruiting Process
There has been much written about recruitment issues in cybersecurity, whether it be a cyber skills gap or retirees taking their expertise with them.
-
Video
Phishing, Ransomware Prevention Plans and Staying One Step Ahead of Cybercriminals
According to the FBI, phishing was the most common type of cybercrime in 2020 and nearly doubled in frequency to 241,324 incidents last year. But why are criminals increasingly looking to phishing to carry out attacks.
-
Video
Data Breaches: It Does Happen All The Time and It Is a Big Deal
Incidents and data breaches are increasing year-on-year.
-
Video
Navigating Data Security in the Cloud
An overwhelming number of businesses today are choosing the cloud to host software applications, govern IT workloads, and assist with facilitating rapid technology innovation. Unfortunately, along with the cloud comes ambiguity regarding data security responsibilities.
-
Video
Third Party Risk Management: Cybersecurity Expertise into Board Governance and a Company’s Digital Defense
As companies the world over grapple with the rising cyber security threat, is it now time to have a director in charge of cybersecurity in the boardroom? If so, how do you ensure you find the right person.
-
Video
Managing Cybersecurity Challenges in Digital Transformation Projects
Design and technology projects can involve heavy use of IT software by a wide group of people, making them a potential target for cyberattackers.
-
Video
Multi-Factor Authentication and the Roadmap to an Organisation’s Increased Security
Multi-factor authentication is becoming more widespread as a key tool in the cyber security armoury.
-
Video
Business Through the Prism of Cyber
When integrating a new technology into your organization, engaging in or trying to mitigate third party risk, one must think of its cyber hygiene. It starts with understanding where your vulnerabilities are, and how you can efficiently manage it
-
Video
IT vs OT: Is There Too Much Operational Technology Online for Hackers?
The attack on the Colonial Pipeline was one of the most major hacks in the history of critical infrastructure. But, this was not a hack on Colonial Pipeline’s IT, but their Operational Technology. The pipeline, which normally carries 2.5m barrels a day, is digital in terms of its operations.
-
Video
Women and Diversity in Cybersecurity: Why Are We Still Having this Conversation?
Recent research by Tessian found that a higher proportion of young men were likely to consider a career in cyber security than young women.
-
Video
Engaging Your Line of Business for Cybersecurity Initiatives
Security cannot be done in a silo. The extent and nature of data shared across line of business functions both internally and externally fuels instances of system and organizational vulnerabilities.