"Cybersecurity and Investors"

"Join Jacob Olcott, VP at BitSight, and Nell Minow, corporate governance expert and co-founder of Institutional Shareholder Services (ISS), for a discussion of key issues, including: How investors assess cybersecurity in the M&A diligence process. What institutional shareholders want to know about cyber risks to their investments. How shareholders can meaningfully engage with companies on cybersecurity".
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

TW-NL Cyber Opportunity Webinar

In the era of globalization, as the international division of labor goes deeper, the industrial development shifts from “manufacturing economy to service economy” and “from hardware manufacturing to soft manufacturing.” The manufacturing industry aims to enhance its international competitiveness with the added value created by the service industry. As a major producer of global ICT products, Taiwan plays an important role in the security industry supply chain during the China-U.S. trade war. It is high time Taiwan develops “Internet of Things Security” and “Secure Internet of Things” with its complete semiconductor industry supply chain. To grasp this opportunity, Taiwanese manufacturers are striving to become not only product suppliers but also cyber security solution providers by taking advantage of the global cyber security research and development. By offering products with distinguishing cyber security functions to customers based on their needs, Taiwanese manufacturers are expecting to create higher added value.
Watch Now

Cyber Security in the Healthcare Industry

The healthcare industry in today’s world has experienced tremendous technological transformation. The developments have brought efficiency and significant benefits to care delivery. On the other hand, the industry faces increasing threats from cybersecurity issues.
Watch Now

Reducing SMB Cybersecurity Risk

Mediapro

Small- and mid-size businesses (SMBs) can no longer afford to think they’re too small to be a target for cybercriminals. That’s why SMBs should consider new or expanded investment in a comprehensive security awareness program to help address the growing risks related to cybersecurity, privacy, and regulatory compliance.
Watch Now

The Key Privileged Access and Security Implications of Granting Third-Party Vendor Access

BeyondTrust

Several different remote access solutions are built into Microsoft Windows to extend third-party vendors access to your systems. In this webinar, Windows and IT security expert Russell Smith weighs in on the pros and cons of using virtual private networks (VPNs), Workplace Join, Remote Desktop Services, and Web Application Proxy to provide third-party remote access.
Watch Now