Key Steps to Identify Risk & Master Vendor Risk Management

In today’s interconnected technology ecosystem, companies increasingly rely on third-party vendors to meet their operational needs. However, the current state of vendor risk management (VRM) is bleak. More than half of all information security breaches are caused by third-party vendors, and according to Deloitte, 83% of today’s business leaders lack confidence in third-party VRM processes. Understanding and managing cyber risk posed by vendors, suppliers, and third parties has proven to be a difficult task. The right mix of people, processes, and technology result in the most effective and comprehensive program.
Watch Now

Spotlight

Cyber attacks are increasing in volume, sophistication, and severity, and the federal government has taken notice. Now, they’re taking action — most recently in the form of new cybersecurity rules from the Securities and Exchange Commission. In “11 Ways to Streamline SEC Cybersecurity Compliance with Risk Cloud,” we explore a va

OTHER ON-DEMAND WEBINARS

2022 IT Trends and Cybersecurity Challenges – Part 1

With each new year’s planning, organizations must deal with both new and longstanding trends that have an impact on their cybersecurity profiles. This process is made even more difficult by an increasingly sophisticated threat landscape and a chronic cyber-skills shortage that impacts all organizations.
Watch Now

11 Ways to Defeat Two-Factor Authentication

KnowBe4

Everyone knows that two-factor authentication (2FA) is more secure than a simple login name and password, but too many people think that 2FA is a perfect, unhackable solution. It isn't! Join Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist, and security expert with over 30-years experience, for this webinar where he will explore 11 ways hackers can and do get around your favorite 2FA solution. The webinar includes a (pre-filmed) hacking demo by KnowBe4's Chief Hacking Officer Kevin Mitnick, and real-life successful examples of every attack type. It will end by telling you how to better defend your 2FA solution so that you get maximum benefit and security.
Watch Now

Cyber Security for Ports and Terminals Webinar

ABS Advanced Solutions

With the recent increase in cyber-attacks on maritime ports and terminals worldwide, more focus is being placed on strategies to reduce cyber risk at maritime facilities. So what does a U.S. Coast Guard compliant cyber security Facility Security Plan (FSP) look like? In 30-minute On-Demand webinars, Captain Dave Nichols, USCG (ret.) Director, Business Development ABS Advanced Solutions ans Cris DeWitt Senior Technical Advisor ABS will provide an overview on maritime facilities with a particular focus on ISPS Regulated Facilities and how the various policies, guidance, and regulations are interconnected. Specific areas being discussed are what the expectations should be for ISPS Regulated Facilities and how proper Cyber Risk.
Watch Now

Financing Security: How M&As and the Markets Are Shaping the Security Industry

SIA

Attend the unique SIA webinar “Financing Security: How M&As and the Markets Are Shaping the Security Industry” to learn more about the impact of the 2018 deals that brought together Amazon and Ring, ADT and Red Hawk, Motorola and Avigilon, Securitas and Kratos, and many others. In addition, this webinar will examine the debt capital markets, equity capital markets, emerging market trends and other financial components of the security industry, while providing a look ahead to the rest of 2019.a
Watch Now

Spotlight

Cyber attacks are increasing in volume, sophistication, and severity, and the federal government has taken notice. Now, they’re taking action — most recently in the form of new cybersecurity rules from the Securities and Exchange Commission. In “11 Ways to Streamline SEC Cybersecurity Compliance with Risk Cloud,” we explore a va

resources