Security WebinarsVIEW ALL WEBINARS
EDT: 11:00 a.m. | PDT: 8:00 a.m. | GMT: 15:00 Is your organization truly safe? Digital business continues to challenge the conventions of risk and security management. IT leaders must develop a clear vision and strategy that enable a coherent digital security program. This webinar unlocks what constitutes an effective digital security vision and strategy, the elements you need for your digital security program, and the drivers that will shape security strategy in 2019.
EDT: 9:00 a.m. | PDT: 6:00 a.m. | BST: 14:00 Despite nearly two years of preparation, Gartner sees many companies still struggling with the General Data Protection Regulation (GDPR). The May 25 start date has come and gone and this remains true: Proper privacy protection is about much more than mere sanction avoidance. As multiple jurisdictions move to mature their privacy requirements, including India, Japan and even the State of California, it pays to implement best practices globally. In this webinar, we review GDPR myths and technology functions that can aid your privacy management program.
Multi-factor authentication (MFA) helps defend against account takeover attacks, the most common type of cyber attack. A new crop of cloud-based MFA services provides support for strong authentication for a variety of scenarios. In this webinar, we discuss cloud-based MFA that can balance trust, user experience and cost. We also review commonly supported MFA use cases, multi-factor authentication methods, and adaptive access functionality that is increasingly demanded by security-conscious organizations.
Organizations are allocating funds for blockchain without defining use cases, putting security and risk management leaders in a bind. Security leaders need to support the adoption of blockchain, but manage the risks that result from relatively unproven tools. In this webinar, we provide high-level concepts of blockchain and discuss how it will impact your organization's information and data security.
A security and risk strategy outlines the approach, but a story engages the organization in why and how they participate in that strategy. Behavior change happens when employees understand why transformation is necessary and how to participate in those modifications. This webinar will explore best practices in creating a story that enhances your strategy. The way to pull that story together is different then you probably think!
EDT: 10:00 a.m. | PDT: 7:00 a.m. | BST: 15:00 A commitment to resilience will equip your digital business with the mindset, resources and planning to recover from inevitable disruptions. Security and risk management leaders should join this webinar to learn the practices that allow a business to continue to support objectives with steady functionality and efficiency. We explore how resilient processes meet the "always on, from anywhere" expectations of customers and the workforce, as resilience must become standard operating procedure and be built into day-to-day operations.
The complexity and speed of change affecting digital business challenges the basic principles of information risk and security management. Many organizations still lack a formal digital (or cyber) security program with a clear vision of what they must achieve. This webinar introduces an actionable vision for security and risk management and discusses the most integral components of security as a part of an effective digital platform strategy.
The deadline for compliance with General Data Protection Regulation (GDPR) is just days away. Organizations that collect personal data on citizens from the European Union (EU) regardless of geographic location will want to know the best way to put GDPR into context and address key requirements of the privacy regulation. This webinar highlights important differences between how the US has historically addressed privacy compared to Europe and the EU specifically. This presentation offers practical guidance on how to address certain key areas of the regulation by incorporating existing security and business continuity management (BCM) practices into the overall GDPR strategy.
Every organization, not just major corporations and government entities, is at risk of being hacked by advanced advisories.In this webinar, we review three case study incidents to highlight the root cause and lessons learned from major hacks. The three incidents we highlight represent the state of the art at the time and/or they illustrate changing patterns that security planners must consider. This discussion focuses on publicly available information that has been corroborated by conversations with people familiar with the details of these events.
Cybersecurity and technology risk functions are often a bottomless pit of demand, expectation, and cost. CIOs should address technology risk and cybersecurity challenges through the lens of business value to deliver appropriate levels of protection that support business outcomes. A mature risk and security function can offer defined levels of protection at defined cost making it possible to manage expectations with non-IT parts of the business. In this webinar, you will learn to transform technology risk and cybersecurity into a business function.