More From Security – Page 6
-
Q&A
Meet the expert: Sudha Madhusudhan to speak at #RISK Amsterdam
We are delighted to announce that GRC leader, Sudha Madhusudhan is to speak at #RISK Amsterdam, opening this month.
-
News
TikTok brings in British cybersecurity firm to shore up data protection
TikTok has taken a significant step towards enhancing its data security programme by enlisting the services of British cybersecurity firm NCC as part of “Project Clover.”
-
News
Diversity, Equity, and Inclusion in Technology Awards 2023
Diversity, Equity, and Inclusion in Technology Awards (DEITA) is the event to celebrate, acknowledge and champion organisations and individuals who are making a difference and leading the way. We welcomed some of the industry’s best to the Royal Lancaster Hotel.
-
News
Corruption and uncertainty dominate political climate in Bulgaria
Experts fear that Bulgaria’s political system could near the brink of collapse this summer if the state is not able to establish a new government and effectively combat endemic corruption.
-
News
Hybrid working may undermine organisational security
The impact of hybrid work on organisational security is a top concern for chief information security officers (CISOs), according to a new study.
-
News
PrivSec London launches this week
PrivSec London opens this week to bring industry professionals to forefront of the global conversation on all things Data Protection, Privacy and Security.
-
News
Diversity, Equity & Inclusion leaders recognised as the inaugural Diversity, Equity & Inclusion in Tech Awards shortlist is revealed
The Diversity, Equity & Inclusion in Tech Awards is delighted to reveal the inaugural cohort of shortlisted individuals, teams, initiatives, and businesses for the 2023 Awards, comprising over 90 finalists across 14 categories.
-
Article
The GRC Red Flag Series – Excerpts from G(P)RC: How GRC Drives Performance in Banking & Finance
Excerpts from the panel discussion in the GRC Red Flag Series episode on September 15th, 2022, featuring Michael Rasmussen, GRC Pundit, GRC 20/20, Anja Ugedahl, Head of Business Performance Management-Sparebank 1 Nord-Norge, and Owe Lie-Bjelland, Director of GPRC Program, Corporater.
-
Training
ISO/IEC 27001:2022 and ISO/IEC 27002:2022, and how they affect your organisation
ISO/IEC 27001:2022 is the newest iteration of the international standard that sets out the specifications for an ISMS (information security management system).
-
Video
PrivSec Dublin 2022 highlights
PrivSec Dublin covered the most pressing and challenging topics from across the data protection, privacy and security sectors.
-
Article
Are You Ready For the Proposed Cyber Resilience Act?
The EU Commission’s proposal for a new Cyber Resilience Act (CRA) aims to safeguard consumers and businesses buying or using products or software with a digital component.
-
Video
The GRC Red Flag Series: G(P)RC - How GRC Drives Performance in Banking & Finance
Access the on-demand video for The GRC Red Flag Series with Michael Rasmussen: G(P)RC - How GRC Drives Performance in Banking & Finance
-
Video
How to Manage Third-Party Risk in Your Supply Chain
Supply chain risks take many forms and can be devastating to your organisation if not properly mitigated. From cybersecurity to reputational and legal issues, managing risk among your vendors and other third parties can be a daunting task.
-
Video
Keeping Pace with Emerging Threats
Cyber criminals are leveraging innovative techniques and taking advantage of new security vulnerabilities. Organizations must evolve and adapt their defenses to protect against the next wave of cybersecurity threats.
-
Video
The human element: Fixing the behaviors that lead to breaches
Cybercriminals continue to launch increasingly sophisticated social engineering attacks. Coupled with a rise in human error, it’s no surprise that 85% of today’s security breaches involve a human element.
-
Video
Choosing the Right Cybersecurity Framework
Implementing a cybersecurity framework is a great way to improve your company’s security posture. But there are a lot of frameworks to choose from, and their suitability varies depending on your company’s industry, size and resources.
-
Video
How to Avoid Software Supply Chain Attacks
From Solarwinds to Kaseya to Log4j—the security risk from software supply chain attacks shows no sign of abating.
-
-
Video
Why Effective Process and Governance is as Important as Technology When IAM issues arise
When IAM issues arise, organizations often lean too heavily on implementing technology with the idea that it will solve all issues related to identity and access.
-
Video
Digital Identity: Will We Ever See a World Without Passwords?
Even with good password management techniques, passwords are a flawed approach to account security. Many of the world’s major tech companies are proposing alternative mechanisms to verify identity and manage access. But what works best—and are there privacy trade-offs?