VigilEnt Policy Center 4.2 Trial
By: SUSE View more from SUSE >>
Download this next:
12 top enterprise risk management trends in 2023
By: TechTarget ComputerWeekly.com
Type: eGuide
Enterprise risk management has taken center stage as organizations grapple with the lingering effects of the COVID-19 pandemic, the threat of a recession and the rapid pace of change.
Executives recognize that stronger ERM programs are required to remain competitive in this new era. One aspect of the current risk landscape that companies must contend with is the connectivity of risks.
Businesses are increasingly more interconnected to partners, vendors and suppliers across global markets. As a result, the impact, for example, of a local natural disaster, the ongoing war in the Ukraine or high interest rates can cascade across an entire global supply chain.
Here are 12 security and risk management trends that are reshaping the risk landscape and influencing business continuity planning.
These are also closely related to: "VigilEnt Policy Center 4.2 Trial"
-
A Computer Weekly buyer's guide to managing paper processes
By: TechTarget ComputerWeekly.com
Type: eGuide
Modern paper processes are ripping up the rule book. In this 13-page buyer’s guide, Computer Weekly looks at risk mitigation, security measures for connected printers and the shift towards end-to-end digitisation.
-
Focus: how to avoid being hit by ransomware
By: TechTarget ComputerWeekly.com
Type: eGuide
The global ransomware attack of May 2017 that affected more than 200,000 computers in over 150 countries shocked many business and political leaders – not least in the UK, where parts of the National Health Service were forced to restrict operations and turn away patients.
But the scale of the attack came as less of a surprise to IT and information security experts, who have been predicting an incident of this severity for a long time.
Will the rapid spread of the WannaCry exploit finally be a wake-up call to organisations to take cyber security more seriously? Only time will tell – but there are no more excuses for not being prepared for further ransomware threats.
In this special report, we analyse the risks of ransomware and provide the latest best practice advice on how to protect your organisation from this fast-growing form of malicious software.
Find more content like what you just read:
-
Infographic: 5 questions to ask when creating a ransomware recovery plan
By: TechTarget ComputerWeekly.com
Type: Infographic
Companies need extensive plans to successfully protect themselves from ransomware attacks. These 'five W's of ransomware' will help organizations ask the right questions when creating a ransomware-specific disaster recovery plan.
-
Top 10 Cybersecurity Threats to Watch for in 2024
By: Keeper Security Inc
Type: Blog
Discover the top 10 cybersecurity threats businesses and individuals face in 2024, including social engineering, ransomware, and AI-powered attacks. Learn how to protect yourself with tips from this informative blog post.
-
Eliminate your API vulnerabilities with Cequence Unified API Protection
By: Cequence
Type: Data Sheet
Today’s security teams simply lack the visibility and defense capabilities they need to protect the ever-growing risk from APIs and other application connections. Check out this data sheet to see how the Cequence Unified API Protection solution can reinforce the vulnerabilities that may undermine your organization.
-
Governance and reporting of climate-related risks and opportunities
By:
Type: Talk
Join Investment Consultant Brendan Walshe and Actuary Alex Darsley from The Pensions Regulator on Monday 28th February at 10am to talk about how your views shaped the regulator’s new guidance, which will help trustees of certain schemes meet tougher standards of governance and reporting in relation to climate-related risks and opportunities. The guidance gives practical examples of ways trustees can comply with the regulations, and an appendix to TPR’s monetary penalty policy highlights the enforcement approach that may be taken to breaches. This month, TPR is also publishing a new step by step example covering the whole process, from the start to the point of TCFD Report publication, following requests during their eight-week consultation for more examples and greater detail. In TPR’s consultation response published alongside the guidance, the regulator has also said trustees must ensure the advice they get from external experts is relevant and helpful, which Brendan and Alex will discuss in more detail during this digital event.
-
[DIA Europe 2024] Complexity: Interplay and Interface of Different Legislations
By:
Type: Video
The EU landscape of policies and regulations governing medicines research, development and manufacturing becomes increasingly complex. Products become more complex and more often than not consist of components regulated by different policies. But there are also unintended consequences where there is a pre-existing link between, for example, food and pharmaceutical rules, or where such link is created when new rules are set up. Developers of medicines must keep an eye not only on the legislation and guidance directly governing pharmaceutical products R&D and manufacturing but also on the interplay between other sectorial policies and legislations driven by considerations specific to food, device, diagnostics, chemicals, environment, data, etc. As a result, these other policies and regulations can either add to the evidence requirements increasing complexity and cost, or even contradict in some instances the principles on which medicines quality, safety and efficacy rely. The session will bring together medicine developers, policymakers, national and European regulators from different domains, patients and academics to shed light on examples of such complexities, their impact, pragmatic mitigation measures and general principles that should drive policy development to avoid that complexity turns into complications that prevent R&D or manufacturing in Europe.
-
Financial markets regulatory outlook 2017
By: TechTarget ComputerWeekly.com
Type: Essential Guide
Financial services companies will face new challenges from innovative financial technology (fintech) companies, regulatory technology (regtech) will push down compliance costs, and there will be a greater emphasis on planning for cyber breaches in 2017, Deloitte predicts in this report.
-
AI & Data Regulations: Key Insights, Strategies, & Technologies for Growth
By:
Type: Talk
New laws and standards around the world are defining responsible, secure, and trustworthy AI (E.g., USA - EO on AI, NIST Gen AI, UK AI Act, EU AI Act, etc.). This webinar will discuss the impact of recent developments and trends on corporate data and AI strategies as well as the role of PETs in these new regulations and frameworks. Learn how regulators and business leaders are embracing new technologies to accelerate growth while satisfying modern data and AI regulations. - Regulatory Overview - The merger of data, AI, and sec ops - What regulators are recommending - How new privacy technologies (PETs) satisfy regulations & accelerate growth ABOUT THE PANELISTS: *Daniel J. Weitzner* is the Founding Director of the MIT Internet Policy Research Initiative, holds the 3Com Founders Senior Research Scientist chair at the MIT Computer Science and Artificial Intelligence Lab, and teaches Internet public policy in MIT’s Electrical Engineering and Computer Science Department. Weitzner was the US Deputy CTO for Internet Policy in the White House, leading initiatives on privacy, cybersecurity, copyright, and digital trade policies promoting the free flow of information. *Paul Comerford* is a Principal Technology Adviser at the UK Information Commissioners office (ICO). The ICO is responsible for regulating data protection law (and other laws). Paul previously worked in academia as a lecturer in Computer Networks and Cyber security. Since joining the ICO in 2018, he has led the development of UK GDPR guidance on anonymisation, pseudonymisation, and was the lead author of ICO PETs guidance published in 2023. *Caroline Louveaux* is the Chief Privacy & Data Responsibility Officer for Mastercard driving Privacy and Data Responsibility Strategy; leading the global teams responsible for privacy, data and AI governance, in terms of legal compliance, policy and regulatory engagement as well as data management, governance and platforms.
-
Global Risks Report 2017
By: TechTarget ComputerWeekly.com
Type: Essential Guide
Society is not keeping pace with technological change, with artificial intelligence and robotics offering the greatest benefits but also the greatest negative effects, this report from the World Economic Forum reveals
-
Fortifying Your IT: The Power of a Linux-Based OS
By: Unicon GmbH
Type: White Paper
Enhance IT security with eLux 7, a Linux-based OS designed to combat cyber threats. Utilizing Linux's strengths like a read-only file system and signed software, plus regular updates, eLux 7 delivers tailored enterprise-grade security. Explore the whitepaper for insights on bolstering your IT infrastructure.
-
Royal Holloway: Lessons on catastrophe - differences and similarities between cyber and other forms of risk
By: TechTarget ComputerWeekly.com
Type: Resource
Cyber insurance is still in its infancy but has shown significant growth, with evidence for further expansion. However, a lack of past information and some idiosyncrasies make pricing difficult, as well as potentially amplifying risk exposure. This article summarises findings from a practical model that could be used in lieu of actuarial data.
-
Why do you need 24X7 SOC at your service
By:
Type: Video
Watch this 4-min video to better understand what is MDR (Managed Detection and Response), and how AWN CyberSOC delivers vigilant cybersecurity through 24X7 monitoring, cloud-based SIEM and customer-dedicated security engineers.
-
Advanced Legal Tips for Cyber Professionals
By:
Type: Talk
Abstract The work of cyber professionals is increasingly legal intensive. Professionals must be vigilant for privacy and contract law risks. Ben will share recent, but not well-known, stories and cases, drawing practical lessons professionals can apply in their day-to-day work.
-
How to Tailor Security with Limited Resources
By:
Type: Video
Many mid-market organizations face security-specific challenges as they grow. It’s not easy protecting an increasingly unique and complex environment without enough resources or staff to confidently keep up with the threats they are facing. So how can these organizations change from reactive to proactive to increase their vigilance, improve their resiliency, and gain strategic guidance to elevate their security programs? Unfortunately, many managed detection and response (MDR) solutions fall short of being able to provide a flexible and holistic solution that doesn’t break their cybersecurity budget. This on-demand webinar covers the challenges mid-market companies face, what a more tailored MDR solution should deliver, and how Secureworks® Taegis™ ManagedXDR Plus builds on the strong foundation of MDR for significantly less than it would cost to accomplish similar outcomes internally.
-
Are we trusting social networks too much?
By: TechTarget ComputerWeekly.com
Type: Essential Guide
This article in our Royal Holloway Security Series sheds an often uncomfortable light on the privacy risks people incur by using social media, and offers advice on how to minimise those risks
-
Disaster recovery and business continuity: Essential guide
By: TechTarget ComputerWeekly.com
Type: eGuide
Not only can a solid business continuity strategy protect organisations from reputational damage and lost trade, but – for those operating in regulated industries – it can also prevent firms being hit with downtime-related enforcement action.
-
Fireside Chat: Building a Security First Culture
By:
Type: Video
Who is responsible for cybersecurity in your organization? Cultivating a security first culture can help create a strong first line of defense, but encouraging a proactive and vigilant approach requires effort. Join this panel as we talk about building awareness, educating employees, and integrating security considerations in everyday workflows to adopt a security-first culture.
-
Managed Detection and Response Answers the Question, “Am I Safe?”
By:
Type: Video
Cyber attacks are becoming more complex, and it is becoming harder to determine what the best strategy is for vigilant cybersecurity. Companies feel like they are playing catchup, and there always seems to be another security hole to fill. Join this 30-min webcast to hear about the emerging security service segment, managed detection and response (MDR).
-
Prioritizing Risk In a Fragmented Cloud
By:
Type: Video
In this session from our Cyber Risk Series - Cloud Security Edition: Cloud is now an important part of most enterprise architectures, but for the those who are not vigilant, the cloud provides a broad attack surface where adversaries can exploit cloud misconfigurations and vulnerabilities to orchestrate breaches. In this session, we’ll discuss how to assess cloud risk, prioritization, and risk reduction.
-
MicroScope - July-August 2024: Is it worth taking a risk?
By: MicroScope
Type: Ezine
In this issue, we take a closer look at the channel's approach to risk, with experts weighing in on with their approach to playing it safe versus taking steps towards innovation. Also read up on why the time is now to learn about AI-capable PCuse cases, as well as why the human factor should not be underestimated when it comes to AI
-
Overview of the cyber threats pension schemes face
By:
Type: Talk
In our keynote session, Paul McGlone and Vanessa Jaeger from Aon, will provide attendees with an overview of the cyber threats facing pension schemes and guidance on what actions trustees and pension managers should be taking to minimise these risks. The session will address a broad range of issues including understanding and establishing your risk profile, the role of trustees, the reliance on and assessment of third party providers, preparing an incident response plans, regulator expectations and the merits of cyber insurance. It will also provide a framework to bring all of this together into a manageable cyber policy.
-
Planning a Realistic Security Awareness Campaign in 2021
By:
Type: Replay
Boy, did we need security awareness training in 2020! As we adapted to the new hybrid situation of staff working from home and from the office, it became clear how difficult it is to keep people safe online. Cybercriminals were quick to exploit any gaps in security, and since the start of the pandemic, there has been an 800% increase in ransomware attacks and a 600% increase in phishing attacks. Your staff need guidance to help increase their vigilance and protect your organisation from evolving cyber threats. We’ve put together some lessons learned to help you plan your 2021 security awareness campaign. Join us at this webinar to find out the key planning approaches to implementing an effective annual security awareness program. Attendees will learn: 1. How little and often ensures consistency. 2. Top tips to avoid end user fatigue. 3. Approaches to bring the leadership function on board with the right security awareness communication strategy. 4. The importance of treating people like adults when obtaining their buy in.
-
New report: State of Application Security in 2024
By: Cloudflare
Type: eBook
Today’s security practitioners and team leaders are responsible for protecting sensitive customer data and staying vigilant against a wide range of web app attacks and API abuse. Download the State of Application Security in 2024 to discover strategies for securing your web apps and APIs.
-
How Geopolitical Tensions Shape the Threat Landscape and Impact Cybercrime
By:
Type: Video
Join this webinar with Ryan Westman, Sr. Manager, Threat Intelligence at eSentire and learn more about: - The key drivers of state-sponsored cyberattacks and notable trends in ransomware - How geopolitical tensions are increasing the weaponization of zero-day vulnerabilities, wiper malware, and more - Recommendations and questions to consider to protect your organization against state-sponsored cyberattacks and remain vigilant about the evolving threat landscape
-
Best Practices in Securing FSI Infrastructure
By:
Type: Video
Cyber criminals don't need to place malware on your system to get in. The vast majority of malware proliferates through online social engineering schemes that manipulate unsuspecting users to open the door wide for hackers. So, how do we stay vigilant in securing FSI infrastructure? Join Mastercard’s Deputy Chief Security Officer, Alissa ‘Dr. Jay’ Abdullah, for a discussion on her unique insights and experience.
-
Security Architecture Review of AI-Based Products and Services
By:
Type: Replay
As Artificial Intelligence (AI) continues to revolutionize industries, organizations are increasingly integrating AI technologies into their products and services. While AI promises innovation and efficiency, it also introduces unique security challenges that demand vigilant attention. Ensuring the trustworthiness and resilience of AI-based products and services is critical to safeguarding sensitive data, maintaining user privacy, and mitigating potential risks.
-
Threat Thursday for September 2019
By:
Type: Video
We're analyzing the biggest security threats currently impacting global IT teams. Here's what we're tracking for the end of August into September: -An ongoing ransomware attack that's hit 23 Texas cities -An update on a Cybersecurity State of Emergency in Louisiana -Updates in the Capitol One data breach Join Ivanti's Phil Richards and Chris Goettl as they deliver the insights and news you need to stay vigilant.
-
Best Practices in Securing FSI Infrastructure
By:
Type: Video
Cyber criminals don't need to place malware on your system to get in. The vast majority of malware proliferates through online social engineering schemes that manipulate unsuspecting users to open the door wide for hackers. So, how do we stay vigilant in securing FSI infrastructure? Join Mastercard’s Deputy Chief Security Officer, Alissa ‘Dr. Jay’ Abdullah, for a discussion on her unique insights and experience.
-
A Guide To Global Regulations and Compliance
By:
Type: Talk
In the aftermath of the Covid-19 pandemic, organisations are seeing an increase in phishing and ransomware attacks, and the transformative impact of Covid-19 has demonstrated the need to implement new cybersecurity and privacy policies. There are new challenges in the cybersecurity and compliance space for both government and business leaders. The movement towards remote working has forced governments and business leaders alike to rethink privacy and security policies. But what do regulations and compliance look like globally in 2021? How have regulations changed in the security space, and what do we expect of the future? Join us in this session as we discuss: - How the pandemic has impacted security regulations and compliance globally - Why adopting new privacy policies strengthens trust in the digital economy - Industry-specific compliance regulations - The ways in which regulations have shifted - What regulatory experts expect to see in the future - and how you can prepare
-
Step-by-step disaster recovery planning guide
By: TechTarget ComputerWeekly.com
Type: eBook
IT disaster recovery is a fundamental task for all organisations. Reasons range from legal and regulatory compliance to the ability to function after an outage. In this e-guide we outline in detail the key steps of disaster recovery planning.
-
Fortify & Thrive: Elevating Your Google Cloud Security Game
By:
Type: Video
Dive into our live solution demo as we unveil essential tactics for staying ahead of evolving threats. From mastering container image vigilance to preempting advanced attacks, we've got you covered. Gain practical insights into risk prioritization and event correlation, empowering you to defend against real-time threats confidently. Ready to elevate your Google Cloud security game? Register now and arm yourself with the knowledge and tools to navigate the ever-changing threat landscape with confidence!
-
Responsible Investment Under President Biden: What Investors Need to Know
By:
Type: Talk
Join the PRI US Policy team for an update on the first two months of the Biden administration, with an overview of the administration’s priorities and actions, policy developments at financial regulators and Congress, and what to expect on the horizon.
-
Recent EU Data Breach Regulations: Are you EU compliant?
By:
Type: Video
Guidance to achieving compliance with new EU regulations With the EU Regulation 611/2013 for ISP/TelCo operators coming into force, the European regulatory framework is giving more precise guidance on the required security measures. The key objective of the EU Regulation is to limit data breaches and incidents. Measures that limit data breaches and incidents are central to the EU regulations, when applied correctly by an organizations security teams. Encryption is the most important recommended measure to achieve compliance and allows the data to become unintelligible. With Encryption organisations can reduce the residual privacy risks to a negligible level. Extended EU regulations with a wider target are expected: The new EU Data Protection Regulation and the Directive on Networks & Information Security (NIS) are both pending EU final approval to come into force. Attend this webinar and discover how to keep your customers data safe and reduce the risk of having to notify a data breach to your customers under the new EU regulations.
-
Tackling Fraud in Today’s Dynamic Risk Environment
By:
Type: Replay
Companies around the globe are grappling with a myriad of business-critical risks such as supply chain disruption, staffing shortages, and increasing cyber threats — just to name a few. As the temptations and opportunities for fraud have increased, fraudsters have taken advantage of the situation by using ever more sophisticated tools to commit their crimes. This rising risk makes it imperative that companies and internal audit functions stay vigilant when it comes to defending against fraud. CPE: This is a webinar recording. Credits are not offered for on-demand viewing.
-
Now That We Can Talk to Our Machines, What Are We Willing to Share?
By:
Type: Talk
Since its inception, customers have used the Cumulocity IIoT platform to give products a metaphorical "voice." The emergence of Large Language Model adoption has created the opportunity to give these products a literal voice - like you can have a conversation with your device. But just as consumers should be wary of phishing attacks, connected device operators and users need to remain vigilant in adopting these technologies. Is the device you're talking to authentic? And should that device trust you to divulge its secrets? Join this session to learn more about IoT platforms, security, and AI models in this brave new world.
-
From Vulnerable to Vigilant: Rapid Risk Reduction
By:
Type: Talk
How much time do you take to remediate a risk after it’s detected? The average time around the world is 60 days, and that’s 60 days for a cyberattacker to attack you! The technological landscape is rapidly changing, and so are the number and severity of cyberattacks. If you delay remediation, your chances of being attacked increases every day. SPEEDY risk reduction is the only way you can combat threats! This live webinar will teach you: - How to reduce your mean time of remediation from months to days. - How to speed up your risk detection AND reduction - How to go from vulnerable to vigilant!
-
Rummin’ With Rumsey Episode 3: Cybersecurity Awareness Training
By:
Type: Video
In Episode 3 of Rummin’ with Rumsey: Cybersecurity Awareness Training, Swimlane’s Head of GRC, Jack Rumsey explains the importance of creating simple and custom security awareness training in-house. It boosts your team’s vigilance and helps maintain compliance. Jack covers how to use text content, screenshots, and short quizzes to keep training simple and engaging. Learn how tailored programs help you meet compliance requirements while enhancing your overall security culture.
-
IPR Quarterly Forecast Tracker - global climate policy, trends & technology
By:
Type: Talk
This webinar will provide PRI signatories with the latest insights from the Inevitable Policy Response (IPR) on the long-term implications of climate and energy policy developments this quarter, including a focus on the United States. Panellists will assess progress against the 2021 IPR Forecast Policy Scenario (FPS), a detailed assessment of climate driven policy acceleration and investor value drivers in energy, carbon pricing, transport, land use and agriculture. Confirmed speakers: Brian Hensley, Partner, Kaya Advisory Catherine Higham, Policy Analyst, Grantham Institute, LSE Kavita Srinivasan, Senior Manager, Vivid Economics Moderated by: Daniel Gallagher, Head of Climate Technical Guidance, PRI
-
DLT Security Framework for the Finance Industry
By:
Type: Replay
DLT introduces a multitude of value propositions for the financial services industry. The pace of innovation is aggressively picking up in use cases pertaining to finance such as digital assets, tokenization and cryptocurrency. However, the security measures are significantly inadequate to support innovation. There is a growing need for increased vigilance and an industry-standard security framework. Please join us as DTCC & CSA speak about the current state of security in the DLT world and announce the launch of the Blockchain working group to address the needs of industrywide DLT Security Framework.
-
Guiding Advisers through Consumer Duty Policy & Final Rules - Time for Action
By:
Type: Talk
Now that we have the widely anticipated Consumer Duty Policy Statement and final rules from the FCA, it’s time to consider what this means for L&G Mortgage Club members. With an increased focus on the end consumer and a key consideration being how firms treat their most vulnerable customers, the FCA has been very clear about what changes they expect from firms through the implementation of its new Consumer Duty. Now with the newly published policy statement PS 22/9, supported by Finalised Guidance publication FG 22/5, it’s time to talk planning, project planning, implementation, MI and much, much more. So, join us as we debate what firms and individuals might consider as part of their project planning to deliver the fundamental shift in mindset that the FCA say they are looking for. Lucy Lewis, Lender Account Executive at Legal & General, will chair the webinar as part of the discussion. Hosting the webinar is John Somerville, the Head of Financial Services at the London Institute of Banking & Finance (LIBF), joined by Julie Pardy, Director of Regulation, and Nic Dent, Head of Client Engagement at Worksmart Ltd.
-
Be Relentless
By:
Type: Talk
We are relentless in our mission to make every organization secure from cyber threats and confident in their readiness. Ever vigilant, our search for the next risks, the next threats and the next answers never ends. We continuously reimagine solutions and reinvent approaches to confront an ever-changing threat landscape. We never stop. Join us at this exclusive webinar and hear from our solution experts on how our unique blend of world-leading intelligence, frontline expertise and controls-agnostic technology helps you make better security decisions. Topics in Discussion: • Mandiant: Your Cybersecurity Advantage • Who is targeting you? • How do attackers see you? • Are you prepared for an attack? • Are you compromised?
-
How AI-enabled digital twins will transform network management
By: Forward Networks
Type: Talk
Join AI and Networking experts Howard Holton from GigaOm and Nikhil Handigol from Forward Networks for an insightful webinar exploring the symbiotic relationship between AI and digital twins. Gain essential insights to navigate the evolving technological landscape as we discuss how generative AI is set to revolutionize network management by enhancing the capabilities of network digital twins. Delve into the potential "dark side" of AI that IT leadership should be vigilant about. Don't miss out on this comprehensive discussion that will shape your understanding of AI-enabled digital twins and their impact on network management.
-
How AI-enabled digital twins will transform network management
By: Forward Networks
Type: Replay
Join AI and Networking experts Howard Holton from GigaOm and Nikhil Handigol from Forward Networks for an insightful webinar exploring the symbiotic relationship between AI and digital twins. Gain essential insights to navigate the evolving technological landscape as we discuss how generative AI is set to revolutionize network management by enhancing the capabilities of network digital twins. Delve into the potential "dark side" of AI that IT leadership should be vigilant about. Don't miss out on this comprehensive discussion that will shape your understanding of AI-enabled digital twins and their impact on network management.
-
Crisis and escalation of the threat landscape
By:
Type: Talk
2021 was a bumpy ride. We started to see an escalation in ransomware and DDoS activity just as organizations accelerated their migration to the cloud and began to embrace the hybrid workplace; simultaneously, crisis set in as supply chain attacks spiked. So far, 2022 has not been kind to us. Nations worldwide have sounded the alarm, calling for vigilance as the Russian/Ukrainian conflict evolves. We have already seen destructive malware and DDoS attacks leveraged by nation-state threat actors and patriotic hacktivists involved in the isolated cyberwar. Still, the concern is growing daily that these events impact European and Western organizations.
-
Crisis and escalation of the threat landscape
By:
Type: Talk
2021 was a bumpy ride. We started to see an escalation in ransomware and DDoS activity just as organizations accelerated their migration to the cloud and began to embrace the hybrid workplace; simultaneously, crisis set in as supply chain attacks spiked. So far, 2022 has not been kind to us. Nations worldwide have sounded the alarm, calling for vigilance as the Russian/Ukrainian conflict evolves. We have already seen destructive malware and DDoS attacks leveraged by nation-state threat actors and patriotic hacktivists involved in the isolated cyberwar. Still, the concern is growing daily that these events impact European and Western organizations.
-
Crisis and escalation of the threat landscape
By:
Type: Replay
2021 was a bumpy ride. We started to see an escalation in ransomware and DDoS activity just as organizations accelerated their migration to the cloud and began to embrace the hybrid workplace; simultaneously, crisis set in as supply chain attacks spiked. So far, 2022 has not been kind to us. Nations worldwide have sounded the alarm, calling for vigilance as the Russian/Ukrainian conflict evolves. We have already seen destructive malware and DDoS attacks leveraged by nation-state threat actors and patriotic hacktivists involved in the isolated cyberwar. Still, the concern is growing daily that these events impact European and Western organizations.
-
How to Maximize your Cybersecurity Strategy without Compromising Your Defense
By:
Type: Replay
What you'll learn: Latest cybersecurity trends and how to defeat creative threat actors If you are spending your security dollars in the right place The benefits of Managed detection and response solutions In a time where we are all being asked to do more with less, in both people and monetary resources, organizations are being asked to make cuts. The problem is – the threats are increasing – and cuts effect your ability to combat them. Secureworks® expert Terry McGraw will discuss the right things to focus on in a lean environment, how survivorship bias can impact your focus and ultimately what are the top things you need to be doing to help keep your organization vigilant in a time of ever-increasing adversarial threats.
-
PIP19 - Devoir de vigilance et chaine d'approvisionnement
By:
Type: Video
Devoir de vigilance et chaine d'approvisionnement : enjeux pour les investisseurs responsables Duty of care and the supply chain: issues for responsible investors En partenariat avec le Forum pour l’Investissement Responsable La France s’est doté d’une loi pionnière en matière de RSE : la loi sur le devoir de vigilance. Le premier exercice a montré que les entreprises découvrent le risk management de leur filière d'approvisionnement. Pour les investisseurs le sujet est clé car une partie majoritaire des risques qui pèsent sur les grandes entreprises proviennent précisément de leur chaine d’approvisionnement. Pour éclairer sur ce thème, le FIR a publié en juin 2019 un Cahier sur ce thème. Sabine Castellan-Poquet, Director of Investments, MACIF Sophie Gaudeul, Confederal Secretary, CFDT Dominique Potier, Member of the French Parliament Patrick Viallanex, Associate Director, A2 Consulting Moderated by Frédéric Vuillod, Fondateur, Mediatico (delivered in French, with English translation available)