Private Equity Cybersecurity: Preliminary Look at Exclusive Compliance Checklist

Join ACG’s Private Equity Regulatory Taskforce (PERT) and Dennis Johnson, Wipfli LLP Risk Advisory Services Manager, as they divulge pertinent information about the best-in-class Wipfli Cybersecurity Checklist. The Cybersecurity Checklist is an exclusive perk for PERT members. However, all webinar attendees will benefit from an illuminating glimpse into the cybersecurity resource. The Cybersecurity Checklist helps firms to measure cybersecurity functions at their particular institution. It does this by using the PERT’s exclusive Cybersecurity “Principle” and the SEC’s cybersecurity guidance.
Watch Now

Spotlight

Cyber attacks are increasing in volume, sophistication, and severity, and the federal government has taken notice. Now, they’re taking action — most recently in the form of new cybersecurity rules from the Securities and Exchange Commission. In “11 Ways to Streamline SEC Cybersecurity Compliance with Risk Cloud,” we explore a va

OTHER ON-DEMAND WEBINARS

Understanding The Role Of Software Bill Of Materials In Cybersecurity Readiness

Cybersecurity issues are top of mind across the open source community, and beyond. In response to the ongoing threat of cyber attacks, Linux Foundation Research, in partnership with SPDX, OpenChain, and OpenSSF, has conducted the first in a series of research projects to understand the challenges and opportunities for securing software supply chains. This soon-to-be-published report, The State of Software Bill of Materials (SBOM) and Cybersecurity Readiness, will be released to coincide with this webinar.
Watch Now

Security, Privacy, and Compliance in 2023: Predictions, Expectations, and Preparations for Data Management in a Post-Pandemic Environment

Learn what the results of the 2022 eDiscovery Unfiltered report indicate about the direction of data management over the next 12 months and how your legal team can navigate current and future security, privacy, and compliance challenges in its approach from a panel of leaders including Marla Crawford, general counsel of Cimplifi, and Paul Lewis, chief executive officer of Calamu in a discussion moderated by industry analyst, Ari Kaplan.
Watch Now

Top 5 Reasons Hackers Want Your Employees’ Mobile Devices

Zimperium

While most organizations are realizing that they need to protect their employees’ mobile devices in order to protect confidential corporate data, some companies try to remain blissfully naive to the hacking opportunities smartphones and tablets present. Given the ever-growing use of mobile devices and the number of mobile cyberattacks, companies can no longer plead ignorance to these mobile threats.
Watch Now

Overcoming Unstructured Data Security and Privacy Choke Points

HealthcareInfoSecurity

Why do so many data loss prevention projects either stall or de-scope? Why with significant industry expenditures in the space do we continue to experience record-breaking instances of data breaches and exfiltration? What are the latest methodologies and technologies security and privacy executives should consider to protect their sensitive data and comply with ever-increasing and pervasive privacy regulations such as GDPR and CCPA. Join Deborah Kish, former Gartner data security analyst, as she shares insights gleaned from hundreds of sessions with CISO, CIO, CDO, CPO and CCOs to offer an insider's playbook to implementing an unstructured data security and privacy program.
Watch Now

Spotlight

Cyber attacks are increasing in volume, sophistication, and severity, and the federal government has taken notice. Now, they’re taking action — most recently in the form of new cybersecurity rules from the Securities and Exchange Commission. In “11 Ways to Streamline SEC Cybersecurity Compliance with Risk Cloud,” we explore a va

resources