From the SOC to the BOD: The Board’s Role in Cyber Security

"As major breaches cause financial and reputational damage to businesses across all industries, there is a push for cyber security to become a board level issue. A recent survey from BDO International found 59% of board directors have become more involved in cyber security within the past twelve months. But how can board members unfamiliar with the ins and outs of network security effectively manage these risks?

Join BitSight’s VP of Business Development, Jacob Olcott, Partner at McKenna Long & Aldridge, Bill Ide and the Executive Director of The Conference Board Governance Center, Donna Dabney for an online roundtable discussion on board involvement in cyber security. The panelists will discuss how both security leaders and board members should approach the communication and management of cyber risks in the enterprise.

Attendees will also learn:

- What cyber security metrics are most important for the board
- Methods for security leaders to communicate cyber issues across the enterprise
- How BitSight’s platform enables communication on security performance throughout the enterprise "
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

Top Ten Ways to Handle Contracts Effectively In-House

Handling a large number of contracts is a fact of life for most in-house attorneys – with an ever-increasing volume and tight deadlines, even before a M&A or other event triggers a voluminous contract review. But it doesn’t have to be chaotic or disorganized: with the right processes and tools you can provide strong, responsive
Watch Now

The Critical Factors to Look for in a Cybersecurity Vendor - 10 November 2022

Are you assessing which cybersecurity vendor to use for your business, or even consolidating to just one? There are some key characteristics and business strategies you’ll want to consider. We’ve turned to global business leaders to share their experience vetting cybersecurity vendors and even trends in the security industry that influenced their choice.
Watch Now

Six Inconvenient Truths About Data-Centric Security (And What to Do About Them)

Omnibus healthcare information security

Despite everything you've spent on data-centric security, there still is a security gap that is burgeoning at an alarming rate when it comes to protecting sensitive data. The growing complexity of users outside your organization, methods of sharing information, and the number of devices data reside on are continually changing and expanding. Rethink your data-centric security in 2019 with insights from IDC's Research Analyst, Rob Westervelt. This educational webcast will highlight how to: Leverage and extend the value of the Data-Centric Security solutions that you have in place. Identify and eliminate blind spots with current solutions such as DLP, Data Classification, and Rights Management to optimize your security.
Watch Now

5 Ways to Leverage Management Data to Improve Data Security

Data security is a constant challenge for most organizations. The average ransomware attack costs a company $5 million, and it takes organizations an average of 191 days to identify data breaches. However, only 25% of organizations today have a dedicated security department in IT (source: CSOOnline). View this on-demand webinar to learn 5 simple ways to leverage your existing management tools and data to improve your IT security, detecting breaches and compromised systems faster and more effectively without having to invest in new tools.
Watch Now