Library – Page 32
-
Video
Creating a Risk-Conscious Culture Across Your Whole Organisation
This panel will consider how ERM teams can create a risk-conscious culture that plays to the strengths of everyone within your organisation.
-
Video
Combatting ransomware with ServiceNow IRM, Security Operations, and Recorded Future
Join us for our webinar, Combatting Ransomware with ServiceNow IRM, Security Operations, and Recorded Future.
-
Video
How Does ESG Inform ERM?
Our panel will consider how ESG is playing an increasingly vital role in ERM, and how you can integrate environmental, social and governance concerns into your ERM program.
-
Video
Build Resilience to Minimise Risk
Our first panel will consider the fundamentals of organisational resilience and its relationship to enterprise risk.
-
Webinar
After the attack: Mitigating Organisational Impact of a Data Breach (DACH region)
You can’t ignore the headlines. We have seen that any organisation, at any time, can suffer a cybersecurity attack, resulting in a devastating data breach. It’s a question of “when” rather than “If”.
-
Video
El fundador de #RISK, Nick James, en conversación con Annie Machon
Nick James, fundador y director de eventos de #RISK habla con Annie Macon, escritora y ex oficial de inteligencia del MI5.
-
Video
#RISK Gründer Nick James im Gespräch mit Annie Machon
Nick James, Gründer und Event Director von #RISK, spricht mit Annie Macon, Schriftstellerin und ehemalige MI5-Geheimdienstoffizierin.
-
Video
#RISK Founder Nick James in conversation with Annie Machon
Nick James, founder and event director of #RISK talks with Annie Macon, writer and former MI5 intelligence officer.
-
Q&A
An Interview with Holly Butterworth, Regional Vice President Delivery, UK & NA at Camms
Holly Butterworth heads up the Camms Services Delivery team in the UK, Europe and North America, leading software implementations in governance, risk, compliance, project and strategic management.
-
Video
Automation and AI: Powerful Tools to Help Fight FinCrime
The scale of financial institutions’ AML efforts means automation is now an important tool to help spot and report suspicious transactions.
-
Video
The comparison between the EU’s July 2021 AML reform proposals and the current US AML regulations
In July 2021, the European Commission proposed a package of reforms to the EU’s anti-money laundering and countering the financing of terrorism (AML/CFT) rules.
-
Q&A
An Interview with Alecia Futerman Associate Director at Control Risks
Alecia Futerman talks about how she has flourished in the male-dominated world of GRC
-
ebook
Dragos: 5 Critical Controls For World-Class Ot Cybersecurity
How to Align Your Leadership and Implement a Successful Operational Technology (OT) Security Posture
-
ebook
Dragos: Pipedream: Chernovite’s Emerging Malware Targeting Industrial Control Systems
This report was proactively written and readied for release as the information became public through other avenues
-
Webinar
Data Retention - The blind spot in your privacy program (Southern Europe region)
The increasing number and complexity of privacy laws have been the driving force for organisations to shift focus from tick-the-box compliance exercises to automated privacy solutions.
-
Video
Wie Verhalten ein wachsendes Money-Maultier-Problem löst
In dieser Sitzung wird Kate Fox, Theat Analytics EMEA, BioCatch untersuchen, wie das Verhalten zur Lösung eines wachsenden weltweiten Problems, Money Mules, beiträgt.
-
Video
Cómo el comportamiento está resolviendo un problema creciente de mulas de dinero
En esta sesión, Kate Fox, Theat Analytics EMEA, BioCatch explorará cómo el comportamiento está ayudando a resolver un problema mundial creciente, Money Mules.
-
Video
Masterclass zum Risiko von Drittanbietern: Berechnung des inhärenten Risikos
In diesem Webinar erfahren Sie, wie Sie: Berechnungen des inhärenten Risikos und eine Bewertungsmethodik entwickeln Ihre Drittanbieter nach Kritikalität und Umfang mit hohem Risiko einstufen und Anbieterbewertungen auf der Grundlage inhärenter Risikobewertungen planen
-
Video
Clase magistral de riesgo de terceros: cómo calcular el riesgo inherente
En este seminario web, aprenderá cómo: Desarrollar cálculos de riesgo inherente y una metodología de puntuación Clasificar a sus terceros por criticidad y alto riesgo Alcance y programar evaluaciones de proveedores basadas en puntuaciones de riesgo inherente
-
Video
Prevención de ataques a la cadena de suministro: mejores prácticas
PrivSec Third-Party Risk explorará la amenaza continua de los ataques a la cadena de suministro y brindará consejos prácticos para reducir su exposición al riesgo.