Key Steps to Identify Risk & Master Vendor Risk Management

BitSight

In today’s interconnected technology ecosystem, companies increasingly rely on third-party vendors to meet their operational needs. However, the current state of vendor risk management (VRM) is bleak. More than half of all information security breaches are caused by third-party vendors, and according to Deloitte, 83% of today’s business leaders lack confidence in third-party VRM processes. Understanding and managing cyber risk posed by vendors, suppliers, and third parties has proven to be a difficult task. The right mix of people, processes, and technology result in the most effective and comprehensive program.
Watch Now

Spotlight

The SuperViz SDK is designed to be the easiest way to add immersive collaboration with video conferencing and avatars to any 3D web application with just a few lines of code.

We sat down with SuperViz CEO and Cofounder, Russ Rive, and VP of Engineering  Tommy Lindestrom, for a series of conversations about the value of creating immersive experiences with a sense of presence and the benefits of building collaboration into web applications.

OTHER ON-DEMAND WEBINARS

Zero Trust Security For Your Distributed Workforces

2020 has caught many businesses off guard. Users, data, devices, critical business applications and networks have left the office and become more distributed. This shift in the way we work & do business has resulted in companies losing visibility into what was happening in their corporate and their employees’ personal networks, devices, and applications. This shift has also seen several cybercriminals and sophisticated hacking groups rapidly adjusting their technique
Watch Now

Navigating the IT Security Certification Labyrinth

udemy

Cybersecurity remains a top priority for IT teams, but how can you prepare you and your team with the right skills? One of the challenges in IT security is the complex web of 200-300 different IT certifications. How can you navigate the IT security certification labyrinth and identify the best pathway for you and your team?
Watch Now

Bringing New Meaning to Extended Detection and Response

For many decades now, emerging threats have put organizations at risk. As the IT landscape evolved and threat actors found new ways to attack, security teams needed to find new ways to detect and respond to threats. While security tools such as SIEM, SOAR and EDR technologies all have their benefits, organizations must look beyond the limits of these offerings to extended detection and response (XDR).
Watch Now

IFAC TAG Webinar on Cyber Security

IFAC

In today’s digital age, many people have at some point wondered whether their online accounts have been compromised or have been part of a large data breach. Like a lot of the issues that make the news on a regular basis, we can become desensitized to cyber risks, but it is imperative, especially for organizations of all sizes, to be vigilant and educate their employees and stakeholders on proper protocols and procedures for minimizing risk. Accounting professionals are in a unique position to address cybersecurity.
Watch Now

Spotlight

The SuperViz SDK is designed to be the easiest way to add immersive collaboration with video conferencing and avatars to any 3D web application with just a few lines of code.

We sat down with SuperViz CEO and Cofounder, Russ Rive, and VP of Engineering  Tommy Lindestrom, for a series of conversations about the value of creating immersive experiences with a sense of presence and the benefits of building collaboration into web applications.

resources