More From Security – Page 6
-
News
Hybrid working may undermine organisational security
The impact of hybrid work on organisational security is a top concern for chief information security officers (CISOs), according to a new study.
-
News
PrivSec London launches this week
PrivSec London opens this week to bring industry professionals to forefront of the global conversation on all things Data Protection, Privacy and Security.
-
News
Diversity, Equity & Inclusion leaders recognised as the inaugural Diversity, Equity & Inclusion in Tech Awards shortlist is revealed
The Diversity, Equity & Inclusion in Tech Awards is delighted to reveal the inaugural cohort of shortlisted individuals, teams, initiatives, and businesses for the 2023 Awards, comprising over 90 finalists across 14 categories.
-
Article
The GRC Red Flag Series – Excerpts from G(P)RC: How GRC Drives Performance in Banking & Finance
Excerpts from the panel discussion in the GRC Red Flag Series episode on September 15th, 2022, featuring Michael Rasmussen, GRC Pundit, GRC 20/20, Anja Ugedahl, Head of Business Performance Management-Sparebank 1 Nord-Norge, and Owe Lie-Bjelland, Director of GPRC Program, Corporater.
-
Training
ISO/IEC 27001:2022 and ISO/IEC 27002:2022, and how they affect your organisation
ISO/IEC 27001:2022 is the newest iteration of the international standard that sets out the specifications for an ISMS (information security management system).
-
Video
PrivSec Dublin 2022 highlights
PrivSec Dublin covered the most pressing and challenging topics from across the data protection, privacy and security sectors.
-
Article
Are You Ready For the Proposed Cyber Resilience Act?
The EU Commission’s proposal for a new Cyber Resilience Act (CRA) aims to safeguard consumers and businesses buying or using products or software with a digital component.
-
Video
The GRC Red Flag Series: G(P)RC - How GRC Drives Performance in Banking & Finance
Access the on-demand video for The GRC Red Flag Series with Michael Rasmussen: G(P)RC - How GRC Drives Performance in Banking & Finance
-
Video
How to Manage Third-Party Risk in Your Supply Chain
Supply chain risks take many forms and can be devastating to your organisation if not properly mitigated. From cybersecurity to reputational and legal issues, managing risk among your vendors and other third parties can be a daunting task.
-
Video
Keeping Pace with Emerging Threats
Cyber criminals are leveraging innovative techniques and taking advantage of new security vulnerabilities. Organizations must evolve and adapt their defenses to protect against the next wave of cybersecurity threats.
-
Video
The human element: Fixing the behaviors that lead to breaches
Cybercriminals continue to launch increasingly sophisticated social engineering attacks. Coupled with a rise in human error, it’s no surprise that 85% of today’s security breaches involve a human element.
-
Video
Choosing the Right Cybersecurity Framework
Implementing a cybersecurity framework is a great way to improve your company’s security posture. But there are a lot of frameworks to choose from, and their suitability varies depending on your company’s industry, size and resources.
-
Video
How to Avoid Software Supply Chain Attacks
From Solarwinds to Kaseya to Log4j—the security risk from software supply chain attacks shows no sign of abating.
-
-
Video
Why Effective Process and Governance is as Important as Technology When IAM issues arise
When IAM issues arise, organizations often lean too heavily on implementing technology with the idea that it will solve all issues related to identity and access.
-
Video
Digital Identity: Will We Ever See a World Without Passwords?
Even with good password management techniques, passwords are a flawed approach to account security. Many of the world’s major tech companies are proposing alternative mechanisms to verify identity and manage access. But what works best—and are there privacy trade-offs?
-
Video
Vendor Risk Management: Can You Trust Vendor Risk Questionnaires?
Vendor risk management questionnaires are often seen as a vital part of the TRPM due diligence process. But how far can you trust your vendors’ responses?
-
Q&A
An Interview with Holly Butterworth, Regional Vice President Delivery, UK & NA at Camms
Holly Butterworth heads up the Camms Services Delivery team in the UK, Europe and North America, leading software implementations in governance, risk, compliance, project and strategic management.
-
Q&A
An Interview with Alecia Futerman Associate Director at Control Risks
Alecia Futerman talks about how she has flourished in the male-dominated world of GRC
-
Feature
Meet the expert: Puja Verma to speak at PrivSec Focus: Third-Party Risk
We are delighted to announce that legal specialist, Puja Verma will be speaking at PrivSec Focus: Third-Party Risk.