ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management Multimedia

  • Build Resilience for Your Business in the New/Next Normal into 2021 and Beyond

    Sponsored by: ServiceNow

    In this new normal, most companies don't have a complete picture of what's happening in various parts of their business. To stay ahead of risks and plan for recovery means having visibility and control, and the right software can help you achieve both. Watch this video to learn about Business Continuity Management from ServiceNow.

  • Transformative Risk Management

    Sponsored by: LogicGate

    Like social distancing to “flatten the curve”, effective risk management starts with focusing on the self and a small inner circle. In this podcast, join 3 distinguished GRC experts and risk leaders as they discuss the new era of risk management. Listen in to hear what they have to say.

  • GRC & Me: A Conversation on Risk Language

    Sponsored by: LogicGate

    Communication is one of the foundational elements of an organization’s ability to ensure productive relationships both within and between companies. In this podcast, join Melissa Ryan, co-founder of Asureti, as she discusses how her risk language and threat rating tools facilitate communication within and between organizations.

  • Beyond COVID-19 Webinar

    Sponsored by: Hyperproof

    COVID-19 has both introduced new risks and amplified existing ones. Business continuity, security, crisis management and customer acquisition have all been put to the test, and all the while, the economy has become totally unpredictable. Watch this webinar to learn how to manage new risks and stay compliant throughout COVID-19 and beyond.

  • Hacker vs CISO: Exploiting and Protecting Your WFH Workforce

    Sponsored by: Tanium

    The hacker is the bane of the CISO, and vice versa. It’s not often that both of these enigmatic personas are in the same room to speak on organizational security and the threat landscape, and during an era of global remote work, their words are quite valuable. Watch this unique webcast to learn perspectives from two opposing security combatants.

  • CipherTrust Data Discovery and Classification from Thales

    Sponsored by: Thales

    To meet today’s regulatory, privacy and security needs requires greater visibility into and understanding of key risk areas. This 5-minute video provides a brief overview of the key features and capabilities of Thales’ CipherTrust Data Discover and Classification, a dashboard designed to help organizations address these challenges.

  • Overcome Alert Fatigue with Actionable Threat Intelligence

    Sponsored by: Bitdefender

    Organizations want to defend from threats, but because of the sensory overload caused by constant alerts, IT departments are suffering from alert fatigue. Fortunately, threat intelligence can use data to alleviate this issue. Watch this webcast to learn more.

  • How to Re-establish Your Network and Security Perimeter

    Sponsored by: Insight

    Data protection is being prioritized now more than ever. Organizations are looking for ways to improve their posture and maintain their business integrity by managing investments based on the correct risk profile. But when it comes to security, correctness takes time. Watch this webcast for a pragmatic approach to privacy and security.

  • Modernizing SOCs with Advanced Threat Intelligence

    Sponsored by: Bitdefender

    This webinar provides a comprehensive look at the challenges, threats, and trends as they relate to today’s SOCs, and offers insight into embracing tactical, operational and strategic threat intelligence. Join Jarret Raim and Daniel Clayton, IT security leaders at Bitdefender, as they discuss the need to modernize your SOC.

  • MITRE ATT&CK: Security Evaluation Overview

    Sponsored by: BlackBerry

    MITRE ATT&CK offers an unbiased, detection-based evaluation designed to provide organizations with insights and information regarding their vulnerabilities – it’s not a competitive analysis with winners, scores or ranking. Watch this webinar, which features 2 BlackBerry experts, for a comprehensive overview of MITRE ATT&CK Evaluations.

  • MITRE ATT&CK: The Power of Prevention

    Sponsored by: BlackBerry

    In this brief webinar, join industry experts as they provide insight into optimizing the MITRE ATT&CK framework using artificial intelligence and machine learning – providing an overview of the framework and why it’s important, as well as the role of AI for enhance threat detection and prevention.

  • Panelist Discussion with Q&A

    Sponsored by: BlackBerry

    In this 14-minute panelist discussion with Q&A, join industry experts as they provide insight into commonly asked questions and hot topics surrounding the MITRE ATT&CK framework – discussing topics from hypothetical testing scenarios to its efficacy as a resource during the COVID-19 pandemic, and more. Watch now to get started.

  • The CISO Speaks: Insights From the Frontlines, Part 2

    Sponsored by: RSA Conference

    Not only is Kuwait’s oil and gas industry critical to its economy—it’s also heavily targeted by global threat actors. In this RSAC Unplugged 2019 Sydney presentation, see how upstream, midstream and downstream companies reached a consensus around common security objectives and a unified governance framework to protect this vital sector.

  • Securing the New Normal: A Virtual Happy Hour on Moving Forward

    Sponsored by: RSA Conference

    In this webcast, a panel of industry leaders discuss the future of cybersecurity, highlighting what’s next for the industry, and the ways in which cybersecurity will evolve as we come to understand the “new normal” – focusing on business processes, procedures and policies, network security architecture and much more.

  • How to Get the Most Value out of Your Penetration Test

    Sponsored by: RSA Conference

    At RSA Conference, Ed Skoudis from the SANS Institute facilitated a problem-solving discussion in the RSAC Engagement Zone. Jump into this webcast to see how he follows up on that discussion. He shares insights into what he learned from the community on getting the most value from penetration testing.

  • The 5 Most Dangerous New Attack Techniques and How to Counter Them

    Sponsored by: RSA Conference

    What are the most dangerous new techniques attackers are employing? This fast-paced briefing features three experts from the SANS Institute best-positioned to provide answers: the nation’s top expert on mobile forensics, the director of the Internet Storm Center and the top hacker exploits expert in the US.

  • COVID-19 App Supplier Risk

    Sponsored by: Syniti

    Watch this brief video to learn how you can use Syniti’s app to track and manage your supplier risk in times of uncertainty.

  • Secureworks Security Maturity Model

    Sponsored by: Dell SecureWorks

    The Secureworks Security Maturity Model is designed to help organizations evaluate and understand their current security maturity in order to develop strategies and target areas for improvement. Want to learn more? View this webcast today.

  • Continuous Risk Monitoring for Vulnerabilities

    Sponsored by: ServiceNow

    In this demo, take a closer look at ServiceNow’s continuous risk monitoring platform and discover how it can help your organization meet its GRC standards by identifying the risks of unpatched vulnerabilities and resolving them quickly. Continue to watch the complete presentation.

  • Software Defined Segmentation Done Easily, Quickly and Right

    Sponsored by: Guardicore

    Recently there has been a realization that traditional methods of segmentation like VLANs and Firewalls are not suitable for today’s rapidly changing enterprise environments. In this webinar, Dave Klein of Guardicore discusses everything you need to know about modern software-defined segmentation.

  • Agile Data Governance: A Bottom-Up Approach

    Sponsored by: Alation

    In this webinar with Malcolm Chisholm of First San Francisco Partners, and Aaron Kalb of Alation, learn best practices for implementing agile data governance and how a data catalog can support these initiatives.

  • Barracuda Advanced Threat Protection for SD-WAN

    Sponsored by: Barracuda

    Tune into this quick, 4-minute video to learn how to protect your users, data, and apps from advanced threats and malware—both at the headquarters and at branch office locations.

  • The Top Industries at Risk for Cyber Attacks

    Sponsored by: Barracuda

    This webinar identifies 4 industries that are at a heightened risk of cyber-attacks, dissects the anatomy of an attack, and demonstrates how to defend your firm and your customers using AI.

  • Email Protection with Asaf Cidon

    Sponsored by: Barracuda

    Asaf Cidon, VP of Email Protection at Barracuda, will highlight how to combat these new threats and improve your email security posture in this video. Tune in for tactical guidance on preventing damage to your brand and fending off attackers that would otherwise harvest your sensitive information.

  • An Overview of Barracuda PhishLine

    Sponsored by: Barracuda

    The following video will help you prepare for a range of threats with patented, highly-variable attack simulations for multiple vectors—including phishing, smishing, vishing, and found physical media. View it now to learn how to put them to use in your organization.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.