Cybersecurity Ratings Part 3: The Third Way

BitSight

Learn how BitSight Security Ratings are used to monitor and manage third-party cyber risk. The third part of this (ISC)² webinar series explores how BitSight Security Ratings help organizations tackle third-party supplier risk management challenges. Bob Lewis (Former Head of External Cyber Assurance and Monitoring, Barclays UK) and Nick Trigg (BitSight Risk Consultant) share real life examples of business challenges within third-party risk and considerations when addressing those challenges.
Watch Now

Spotlight

For the third consecutive year, Keyfactor and The Ponemon Institute have collaborated on the State of Machine Identity Management report —an in-depth look at the role of PKI and machine identities in establishing digital trust and securing modern enterprises. This year’s report provides an analysis of 1,280 survey responses from

OTHER ON-DEMAND WEBINARS

Your Code Isn’t Static Your Processes Shouldn’t be Either

The only thing constant is change, and change requires oversight and very possibly an overhaul of your processes to support any shifts. The open source world is not exempt. Net, your code isn't static so your processes shouldn't be either. What open source management processes should be in your team's eyeline? How does change im
Watch Now

The Role of Human Error in Information Security

PECB

It has become an established fact that the human factor is the most important element to secure in any organization if security is to be maintained. This case study will take real-life examples (with no names used!) and examine some actual security incidents caused by human error and elaborate on the root cause and prevention tips resulting from these events.
Watch Now

How NHS Bolton Empowers Its Security Team with AI

Watch this webinar to hear how NHS Bolton Foundation Trust, a UK regional healthcare provider has overcome stretched resources using an innovative approach of automation and AI.
Watch Now

That Was Close! Tales of Near-Miss Mobile Attacks

Zimperium

100% of Zimperium customers have detected mobile threats, and many of those customers previously believed they weren’t at risk. If you think your mobile devices are not being attacked, we are sorry to tell you that you are wrong. But don’t take our word for it, join us for tales of near-miss mobile attacks from real customers. They are near-misses only because Zimperium detected the attacks, but they could have been disastrous otherwise.
Watch Now

Spotlight

For the third consecutive year, Keyfactor and The Ponemon Institute have collaborated on the State of Machine Identity Management report —an in-depth look at the role of PKI and machine identities in establishing digital trust and securing modern enterprises. This year’s report provides an analysis of 1,280 survey responses from

resources