Risk Management Research
-
Global CISO Playbook for the New Normal
Sponsored by: FidelisIt’s arguable that CISOs have the toughest job in the world right now. Growing cyber terrains, evolving threat landscapes and skill shortages are all placing more pressure on these professionals than ever before. Download this e-book to hear from the CISO of Fidelis Cybersecurity as he outlines strategies and best practices for cyber defense.
-
Vendor Portfolios for Secure Web Gateways
Sponsored by: NetskopeVendors are expanding their core secure web gateways (SWG) to add more security features such as CASB, zero-trust network access, FWaaS and remote browser isolation. Download this Gartner Magic Quadrant to examine broader portfolios that may help you consolidate security vendors.
-
SASE and the Forces Shaping Digital Transformation Part 3: Government and Industry Regulations, and Global Social and Economic Forces
Sponsored by: NetskopeSASE adoption must be done with an awareness of not just governmental and industry regulations, but also shifts in security budgets, the economy at large and even global conflicts and trade wars. View this blog post exploring SASE and these forces shaping digital transformation.
-
Navy Federal Credit Union on Security During Crisis
Sponsored by: SynackLeading an organization or a team during the COVID-19 pandemic is a challenge regardless of title. However, the CISO is uniquely armed with the skills to respond, manage and lead a team during crisis. In this podcast, hear from the CISO of Navy Federal Credit Union as he shares his methods for building trust and maintaining business as usual.
-
How to Manage Risk and Compliance for Financial Services
Sponsored by: BigIDWhile meeting compliance standards is a requirement for financial services institutions, the sad reality is that many companies don’t have as much of a handle on their data as they might think. Download this white paper to learn how BigID can help financial organizations organize, secure, and regulate their data across multi-cloud ecosystems.
-
Innovation Insight For Extended Detection And Response
Sponsored by: Palo Alto CortexDisparate risk management teams and security tools make it difficult to efficiently mitigate threats. This Gartner report highlights the risks and advantages of today’s leading extended detect and response (XDR) tools – designed to unify incident detection and response efforts into a single platform.
-
Dealing with VUCA
Sponsored by: InteliSecureToday’s IT and security leaders are responsible for dealing with VUCA – volatility, uncertainty, complexity, and ambiguity – and address data security risks in an ever-changing landscape. Read this InteliSecure e-guide to address the elements of VUCA and build agile data protection.
-
The New Workplace: Modernizing Security, Compliance and Remote Work
Sponsored by: MicrosoftToday, nothing is more important than empowering your remote workforce with modern, integrated, resilient, cloud-enabled security and compliance protections. Check out this information hub to help you address your most pressing workplace challenges today.
-
Improve Security & Compliance
Sponsored by: Red HatSpeed and response time are essential in reducing the impact of data breaches – in fact, containing a breach within 200 days or less reduced the overall cost of a breach by more than 50% in 2020. Read this e-book to learn more about how to improve security, reduce risk and ensure compliance.
-
Arrow & RSA Video 2: Protect and Optimize Your Workforce with RSA SecurID Access
Sponsored by: Arrow & RSADigital transformation initiatives and approaches to remote workers have accelerated, and these changes bring new challenges and risks. In this webinar, learn how to address these new risks from an identity and access management perspective and how new capabilities in RSA SecurID Access strive to help you succeed in today’s environment.
-
Reducing Security Risk in the Financial Services Industry
Sponsored by: AWS Rapid7A report from the Department of Digital, Culture, Media and Sport revealed almost half of UK businesses (46%) have had cybersecurity breaches or attacks in the last 12 months. The financial services industry is a prime target for such attacks, but by absorbing this white paper, you can learn measures to take to reduce organizational risk.
-
Continuous Compliance on AWS
Sponsored by: AWS Mphasis/StelligentMost of the typical activities involved in compliance are nothing more than ‘risk management theater’: a mere spectacle that has very little to do with assessing or reducing actual risk. What if there was a way AWS users could assess, audit and evaluate the configurations of their AWS resources on a continuous basis? This webcast explains how.
-
Evaluating Data-Centric Protection Solutions
Sponsored by: Comforte AGData is the lifeblood of any organization, and as such, it’s critical that any data-centric protection system works 100% of the time. Moreover, these systems must be vetted so you know you’re getting an agile, yet mission-critical tokenization service. Absorb this guide for evaluating and comparing tokenization solutions.
-
The Maturity Model for Governance, Risk, and Compliance
Sponsored by: AptibleFor more than a decade, the GRC framework has helped companies maintain their data integrity and manage risk in an increasingly digital world. But with compliance growing more and more complex, your GRC operations need to mature as your business does. Scrutinize this guide to understand how to evolve your GRC model in 4 levels.
-
How to Level Up Your Access Control
Sponsored by: AptibleAs an organization grows, more users and more systems mean exponentially more reviews. As compliance professionals know, this can become an unmanageable task – especially without the right tools. How can you help your organization to develop better access control? This guide from Aptible may provide the answer.
-
Gett Gains Competitive Edge
Sponsored by: PanoraysGett, a European on-demand car service, was looking for a better way to manage their third-party security. Currently, their vendors underwent a lengthy vetting process to check that their security posture was strong. However, Gett wanted to streamline this process. In this case study, learn how they was able to do this with the help of Panorays.
-
Taking Your Third Party Security Program to the Next Level
Sponsored by: PanoraysToday, every organization’s attack surface is growing. It is growing for several reasons, including because organizations are outsourcing large portions of their IT systems to cloud providers, thereby adding their “bubble” to your own. In this webcast, learn how you can upgrade your third-party security program.
-
The CISO's Guide to Rapid Vendor Due Diligence
Sponsored by: PanoraysIn 2019, nearly half of companies experienced a significant data breach that came through a third party. In response, security pros have begun demanding that vendors demonstrate and maintain healthy security habits. Read this e-guide to discover 7 critical capabilities of a rapid vendor due diligence program.
-
Creating a Culture of Security
Sponsored by: HelpSystemsYou can invest in all the security tools you want, you can provision every security tool correctly and you can eliminate as much risk as possible – but if your organization is not creating a culture of security, you’re nowhere. Enter this white paper and extract 4 steps to cultivating security awareness among your network’s users.
-
NetApp AI Solutions for Financial Services
Sponsored by: NetAppThe financial services industry is increasingly relying on AI and ML technologies like NetApp ONTAP AI with cloud-connected all-flash storage to improve their defenses and better serve their customers. Check out this data sheet to learn 3 key benefits of NetApp ONTAP AI.
-
How to Elevate Your Threat Intelligence Program
Sponsored by: DomainToolsAccording to the SANS 2020 Cyber Threat Intelligence Survey, 82% of organizations find value in threat intelligence, however, only 4% of respondents had processes in place to measure effectiveness. So, how do you demonstrate and quantify the value of your threat intelligence program? View this Forrester-sponsored webcast to learn the answer.
-
Evaluating and Measuring DDoS Risk During the COVID-19 Era
Sponsored by: Akamai TechnologiesDistributed denial-of-service (DDoS) attacks range from small and sophisticated to large and bandwidth-busting. Unplanned outages are costly, requiring fast and effective DDoS mitigation. Join Dennis Birchard, Akamai’s Lead Principal Cloud Security Architect, to learn about DDoS trends, mitigation strategies and more.
-
How to Identify Threats Faster and Increase Productivity
Sponsored by: DomainToolsWith the rapid-fire speed of alerts and multitasking required in infosecurity, security operation center (SOC) professionals often must determine the potential outcomes of events with limited context. How can your teams reduce operational risk and be more productive? Watch this webinar to learn how to address this challenge and others.
-
Success Patterns for Supply Chain Security
Sponsored by: PanoraysThreats targeting supply chains are on the rise, impacting businesses across all 3 elements of the confidentiality, integrity and availability (CIA) triad. The following SANS whitepaper further explores these challenges and highlights the key components of an effective supply chain security program – read on to get started.
-
NWN SecureX Online Workshop
Sponsored by: NWN CorporationToday’s cybersecurity paradigm has completely changed – security programs are now in the spotlight of the board of directors and security teams are faced with mounting pressure on numerous fronts. Watch this webinar to learn more about today’s challenges and how NWN is helping organizations address them.