Cybersecurity Ratings Part 3: The Third Way

Learn how BitSight Security Ratings are used to monitor and manage third-party cyber risk. The third part of this (ISC)² webinar series explores how BitSight Security Ratings help organizations tackle third-party supplier risk management challenges. Bob Lewis (Former Head of External Cyber Assurance and Monitoring, Barclays UK) and Nick Trigg (BitSight Risk Consultant) share real life examples of business challenges within third-party risk and considerations when addressing those challenges.
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

HIPAA Compliance – Are You Staying Healthy?

Alert Logic

The medical/healthcare industry accounted for more than 23 percent of total cybersecurity breaches*. But, keeping up-to-date with HIPAA requirements to help protect data can be difficult. And selecting technologies so your organization can implement HIPAA security controls to comply with HIPAA regulations can be overwhelming. We can help you break it down. In this webinar we will walk through: The current state of HIPAA compliance, and how businesses are stacking up. Top reasons for HIPAA compliance failures and how to avoid them.
Watch Now

Enterprise Phishing Attacks & the Need to Defend Mobile Endpoints

Zimperium

The new GigaOm “Phishing Prevention and Detection: A GigaOm Market Landscape Report,” designed to help C(x)Os and security practitioners evaluate phishing prevention solutions, recognizes that mobile endpoints are poised to be the next high-value target for phishing attacks. The majority of mobile endpoints lack protection beyond Mobile Device Management risk assessments; these endpoints are completely exposed to phishing and other attacks.
Watch Now

NIST Recommendations for ICS & IIoT Security

SANS

WannaCry, NotPetya, and TRITON demonstrate that ICS and IIoT networks continue to be soft targets for cyberattacks, increasing the risk of costly downtime, safety failures, environmental incidents, and theft of sensitive intellectual property. NIST and the NCCoE recently published a NIST Interagency Report (NISTIR) demonstrating how off-the-shelf, ICS-aware behavioral anomaly detection (BAD) effectively reduces cyber risk for manufacturing organizations, without impacting OT networks, as well as risk from equipment malfunctions.
Watch Now

Transform Security and Risk Into a Business Function: A Panel Discussion

Gartner

As organizations and governments race towards digital transformation, they expose themselves to a variety of risks that traditional information and cybersecurity practices are not accustomed to encountering. In the face of technology evolution, regulatory complexity, an increasing threat landscape and limited resources, will security and risk leaders be able to align to the ambitious goals set by their business leaders? In this unique complimentary live video discussion, 4 leading Gartner security & risk experts debate how the nature of risks are evolving and what you can do to transform security and risk into a business function.
Watch Now