Risk Management Multimedia
-
SASE and the Forces Shaping Digital Transformation Part 3: Government and Industry Regulations, and Global Social and Economic Forces
Sponsored by: NetskopeSASE adoption must be done with an awareness of not just governmental and industry regulations, but also shifts in security budgets, the economy at large and even global conflicts and trade wars. View this blog post exploring SASE and these forces shaping digital transformation.
-
Navy Federal Credit Union on Security During Crisis
Sponsored by: SynackLeading an organization or a team during the COVID-19 pandemic is a challenge regardless of title. However, the CISO is uniquely armed with the skills to respond, manage and lead a team during crisis. In this podcast, hear from the CISO of Navy Federal Credit Union as he shares his methods for building trust and maintaining business as usual.
-
Arrow & RSA Video 2: Protect and Optimize Your Workforce with RSA SecurID Access
Sponsored by: Arrow & RSADigital transformation initiatives and approaches to remote workers have accelerated, and these changes bring new challenges and risks. In this webinar, learn how to address these new risks from an identity and access management perspective and how new capabilities in RSA SecurID Access strive to help you succeed in today’s environment.
-
Continuous Compliance on AWS
Sponsored by: AWS Mphasis/StelligentMost of the typical activities involved in compliance are nothing more than ‘risk management theater’: a mere spectacle that has very little to do with assessing or reducing actual risk. What if there was a way AWS users could assess, audit and evaluate the configurations of their AWS resources on a continuous basis? This webcast explains how.
-
Taking Your Third Party Security Program to the Next Level
Sponsored by: PanoraysToday, every organization’s attack surface is growing. It is growing for several reasons, including because organizations are outsourcing large portions of their IT systems to cloud providers, thereby adding their “bubble” to your own. In this webcast, learn how you can upgrade your third-party security program.
-
How to Elevate Your Threat Intelligence Program
Sponsored by: DomainToolsAccording to the SANS 2020 Cyber Threat Intelligence Survey, 82% of organizations find value in threat intelligence, however, only 4% of respondents had processes in place to measure effectiveness. So, how do you demonstrate and quantify the value of your threat intelligence program? View this Forrester-sponsored webcast to learn the answer.
-
Evaluating and Measuring DDoS Risk During the COVID-19 Era
Sponsored by: Akamai TechnologiesDistributed denial-of-service (DDoS) attacks range from small and sophisticated to large and bandwidth-busting. Unplanned outages are costly, requiring fast and effective DDoS mitigation. Join Dennis Birchard, Akamai’s Lead Principal Cloud Security Architect, to learn about DDoS trends, mitigation strategies and more.
-
How to Identify Threats Faster and Increase Productivity
Sponsored by: DomainToolsWith the rapid-fire speed of alerts and multitasking required in infosecurity, security operation center (SOC) professionals often must determine the potential outcomes of events with limited context. How can your teams reduce operational risk and be more productive? Watch this webinar to learn how to address this challenge and others.
-
NWN SecureX Online Workshop
Sponsored by: NWN CorporationToday’s cybersecurity paradigm has completely changed – security programs are now in the spotlight of the board of directors and security teams are faced with mounting pressure on numerous fronts. Watch this webinar to learn more about today’s challenges and how NWN is helping organizations address them.
-
Vendor Risk Management by Deloitte
Sponsored by: ServiceNowServiceNow Vendor Risk Management supports enterprises with their Vendor Risk Management process and enables them to support the Vendor Risk Lifecycle with ease. It provides a centralized process for managing vendor portfolios, assessing vendor risks including the tiering process and completing a remediation lifecycle. Learn more here.
-
Refining risk resolution for the new normal
Sponsored by: ServiceNowIf the COVID crisis has taught us anything it’s that adaptability is necessary for success. In this session, you will learn how enhancements to Advanced Risk Assessment will get you information more quickly, so you can get ahead of risks.
-
Refining risk resolution for the new normal
Sponsored by: ServiceNowIf the COVID crisis has taught us anything it’s that adaptability is necessary for success. In this session, you will learn how enhancements to Advanced Risk Assessment will get you information more quickly, so you can get ahead of risks.
-
Build Resilience for Your Business in the New/Next Normal into 2021 and Beyond
Sponsored by: ServiceNowIn this new normal, most companies don't have a complete picture of what's happening in various parts of their business. To stay ahead of risks and plan for recovery means having visibility and control, and the right software can help you achieve both. Watch this video to learn about Business Continuity Management from ServiceNow.
-
CipherTrust Data Discovery and Classification from Thales
Sponsored by: ThalesTo meet today’s regulatory, privacy and security needs requires greater visibility into and understanding of key risk areas. This 5-minute video provides a brief overview of the key features and capabilities of Thales’ CipherTrust Data Discover and Classification, a dashboard designed to help organizations address these challenges.
-
How to Re-establish Your Network and Security Perimeter
Sponsored by: InsightData protection is being prioritized now more than ever. Organizations are looking for ways to improve their posture and maintain their business integrity by managing investments based on the correct risk profile. But when it comes to security, correctness takes time. Watch this webcast for a pragmatic approach to privacy and security.
-
MITRE ATT&CK: Security Evaluation Overview
Sponsored by: BlackBerryMITRE ATT&CK offers an unbiased, detection-based evaluation designed to provide organizations with insights and information regarding their vulnerabilities – it’s not a competitive analysis with winners, scores or ranking. Watch this webinar, which features 2 BlackBerry experts, for a comprehensive overview of MITRE ATT&CK Evaluations.
-
MITRE ATT&CK: The Power of Prevention
Sponsored by: BlackBerryIn this brief webinar, join industry experts as they provide insight into optimizing the MITRE ATT&CK framework using artificial intelligence and machine learning – providing an overview of the framework and why it’s important, as well as the role of AI for enhance threat detection and prevention.
-
Panelist Discussion with Q&A
Sponsored by: BlackBerryIn this 14-minute panelist discussion with Q&A, join industry experts as they provide insight into commonly asked questions and hot topics surrounding the MITRE ATT&CK framework – discussing topics from hypothetical testing scenarios to its efficacy as a resource during the COVID-19 pandemic, and more. Watch now to get started.
-
The Latest Trends in Data Cataloging for BI
Sponsored by: AlationIn this webinar, watch Dresner Advisory Service and Alation discuss the latest trends in data cataloging for BI. Learn about the latest findings from Dresner Advisory Services' second annual Data Catalog Market Study, and discover why 90% of respondents believe that data governance is critical to business success.
-
Agile Data Governance: A Bottom-Up Approach
Sponsored by: AlationIn this webinar with Malcolm Chisholm of First San Francisco Partners, and Aaron Kalb of Alation, learn best practices for implementing agile data governance and how a data catalog can support these initiatives.
-
Barracuda Advanced Threat Protection for SD-WAN
Sponsored by: BarracudaTune into this quick, 4-minute video to learn how to protect your users, data, and apps from advanced threats and malware—both at the headquarters and at branch office locations.
-
The Top Industries at Risk for Cyber Attacks
Sponsored by: BarracudaThis webinar identifies 4 industries that are at a heightened risk of cyber-attacks, dissects the anatomy of an attack, and demonstrates how to defend your firm and your customers using AI.
-
Email Protection with Asaf Cidon
Sponsored by: BarracudaAsaf Cidon, VP of Email Protection at Barracuda, will highlight how to combat these new threats and improve your email security posture in this video. Tune in for tactical guidance on preventing damage to your brand and fending off attackers that would otherwise harvest your sensitive information.
-
An Overview of Barracuda PhishLine
Sponsored by: BarracudaThe following video will help you prepare for a range of threats with patented, highly-variable attack simulations for multiple vectors—including phishing, smishing, vishing, and found physical media. View it now to learn how to put them to use in your organization.
-
Barracuda Lightboard: Total Email Protection
Sponsored by: BarracudaThis video discusses the evolution of advanced email threats, so tune in to learn how to establish multi-layered protection to thwart them before they infiltrate your organization.