Cybersecurity Ratings Part 3: The Third Way

Learn how BitSight Security Ratings are used to monitor and manage third-party cyber risk. The third part of this (ISC)² webinar series explores how BitSight Security Ratings help organizations tackle third-party supplier risk management challenges. Bob Lewis (Former Head of External Cyber Assurance and Monitoring, Barclays UK) and Nick Trigg (BitSight Risk Consultant) share real life examples of business challenges within third-party risk and considerations when addressing those challenges.
Watch Now



5 Reasons why a people-centric security strategy safeguards sensitive information and facilitates compliance

Users often ignore internal security controls in order to get work done quickly. This puts the security of confidential information at risk. Tune in to this webinar to learn why a people-centric approach to security is the best way to protect your company’s sensitive data and IP, to achieve and maintain compliance, and to encour
Watch Now



Today, organizations are faced with increasingly complex systems driven by McAfee + Cisco-Threat Response Webinar Blogdissolving enterprise boundaries, ubiquitous user data in the cloud and an increasing volume and sophistication of cyber attacks across multiple vectors. Siloed cyber security solutions only add complexity and restrict your ability to protect and respond to advanced attacks, while increasing costs and management overhead.
Watch Now

3-Minute Video: Overcoming the Challenges of an Unplanned Distributed Workforce

When the world stayed home overnight, organizations had to rapidly solve the challenges of an unplanned distributed workforce – from maintaining visibility across the IT environment and tracking corporate and BOYD devices to closing existing and new vulnerability gaps. Tanium's unique structure was built for these challenging en
Watch Now

Improving AppSec With Application Security Posture Management

By now, everyone has heard of the *AST scanning technologies. Most have been around for 15+ years, yet organizations are still struggling to eliminate AppSec issues like SQL injection and XSS vulnerabilities because these scanning tools look at vulnerabilities through a vulnerability lens, not a contextual risk lens.
Watch Now