Risk Mitigation or Risk Transference – Lessons from Physical Security

Every week we hear of new data breaches, estimates guess that only 10% of breaches make it to the public, so with so many breaches, where are security and risk professionals going wrong. This talk will take a look at the use of risk mitigation and risk transference in physical security and how these are strangely not replicated in logical / Information Security
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

API Security Through the Lens of Modern DevSecOps

Application Programming Interfaces (APIs) have evolved into business-critical services with a unique set of application security needs. The evolution of the Business Logic Layer was accelerated in part by the popularity of the Postman API Platforms; however, traditional security testing products have struggled to adapt. This next generation of business logic API collections require a fundamentally new technology and native testing experience that empowers organizations to overcome modern security challenges.
Watch Now

2022 Cyber Challenges & Industry Intelligence Study

The modern security organization is fueled by intelligence, advanced technology, and more knowledgeable professionals than any other point in history. However, the endless war that started at the dawn of connectivity often sees the same challenges as we do today and much of this stems from the misconception that organizations must fight threat actors on their own. This myth continues to create siloes, both internally and externally, and prevents teams from gaining necessary threat visibility or reducing overloaded analysts workload.
Watch Now

Top Ten Ways to Handle Contracts Effectively In-House

Handling a large number of contracts is a fact of life for most in-house attorneys – with an ever-increasing volume and tight deadlines, even before a M&A or other event triggers a voluminous contract review. But it doesn’t have to be chaotic or disorganized: with the right processes and tools you can provide strong, responsive
Watch Now

Moving Beyond Blindspots: How to Reduce Security Risks in the Cloud

Understanding your complex cloud environment is tricky. Workloads, containers, and serverless functions are added and removed constantly. Vulnerabilities are endless. Security staff is in short supply. But here’s the reality: cloud security is built in incremental steps. And process improvement involves multiple stakeholders — not just security teams.
Watch Now