Private Equity Cybersecurity: Preliminary Look at Exclusive Compliance Checklist

ACG

Join ACG’s Private Equity Regulatory Taskforce (PERT) and Dennis Johnson, Wipfli LLP Risk Advisory Services Manager, as they divulge pertinent information about the best-in-class Wipfli Cybersecurity Checklist. The Cybersecurity Checklist is an exclusive perk for PERT members. However, all webinar attendees will benefit from an illuminating glimpse into the cybersecurity resource. The Cybersecurity Checklist helps firms to measure cybersecurity functions at their particular institution. It does this by using the PERT’s exclusive Cybersecurity “Principle” and the SEC’s cybersecurity guidance.
Watch Now

Spotlight

We know that cyber security is complex and open to continuous threat. iOCO’s status as a WithSecure Gold Partner in Africa gives you all you need to automatically predict, prevent, detect, and respond to any risk and threat 24-7-365.

OTHER ON-DEMAND WEBINARS

How to Remove Complexity as a Threat to Security

Cyxtera

No doubt as a security leader you are constantly making decisions on what tools and solutions are needed to secure your elusive IT landscape. Complexity may be threatening your security posture as you react to secure your hybrid workloads. Join Leo Taddeo, CISO at Cyxtera and former Special Agent in Charge of the Special Operations/Cyber Division of the FBI’s New York Office alongside Jason Garbis and Ian Breeze of Cyxtera, as we address the mounting complexity security professionals face today. Access the webinar replay to hear recommendations for removing unnecessary complexity that threatens your cyber resiliency.
Watch Now

Key Insights Into Today's Risk Management Landscape

BitSight

Today, cyber risk management affects organizations of all sizes across all industries. With data breaches on the rise and sensitive client information increasingly at risk, businesses need to elevate their existing risk management strategies to become more comprehensive. To proactively mitigate risk, organizations need to create a lasting risk management program that can scale with the growth of their business and sustain the changing risk landscape.
Watch Now

Attack Tactics 6! Return of the Blue Team

Black Hills Information Security

In this webcast we walk through the step-by-step defenses to stop the attackers in every step of the way we showed in Attack Tactics Part 5. Introduction, password spray toolkit, account lockout, honey accounts, canary tokens, and two factor authorization. fixthefuture , two factor authorization, dumping global address lists, mailsniper 20:30 Lateral movement, OWA, VPN, SSH. Scanning and enumeration, Nmap, SSH Brute Force, “Find Open”, LLMNR, LLMNR Responder, and NrlmRelayX.
Watch Now

Improving AppSec With Application Security Posture Management

By now, everyone has heard of the *AST scanning technologies. Most have been around for 15+ years, yet organizations are still struggling to eliminate AppSec issues like SQL injection and XSS vulnerabilities because these scanning tools look at vulnerabilities through a vulnerability lens, not a contextual risk lens.
Watch Now

Spotlight

We know that cyber security is complex and open to continuous threat. iOCO’s status as a WithSecure Gold Partner in Africa gives you all you need to automatically predict, prevent, detect, and respond to any risk and threat 24-7-365.

resources