This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
During this webinar, you will learn how this global outage happened, what other security risks may be on the horizon, what lessons we can all learn from recent events, and what individuals, businesses, and governments can do to avoid similar disasters in the future. Register now by clicking this link in order to secure your spot.
Join Bonnie Stith, former Director of the CIA’s Center for Cyber Intelligence , and and Joseph Steinberg, renowned cybersecurity expert witness and columnist , for a special, free educational webinar, Best Practices for Asset Risk Management in Hospitals. The discussion will cover: * How IT asset risks have evolved.
While the introduction of artificial intelligence (AI) is certainly delivering many benefits to mankind, including in the realm of cybersecurity, it has also created all sorts of new risks as evildoers seek to harness AI for their illicit and harmful purposes. The webinar is FREE thanks to the sponsorship of ColorTokens.
In recent weeks, I did two fun webinars related to Security Operations, and there was a lot of fun Q&A. For extra fun, I had ChatGPT answer some of them, to see if it can replace me :-) So, first, ISACA webinar “Modernize Your SOC for the Future” focused on our Autonomic Security Operations vision. with the SOC?
Speaker: William Hord, Senior VP of Risk & Professional Services
Enterprise Risk Management (ERM) is critical for industry growth in today’s fast-paced and ever-changing risk landscape. Do we understand and articulate our bank’s risk appetite and how that impacts our business units? How are we measuring and rating our risk impact, likelihood, and controls to mitigate our risk?
As the adoption of generative AI tools, like ChatGPT, continues to surge, so does the risk of data exposure. According to Gartner’s "Emerging Tech: Top 4 Security Risks of GenAI" report, privacy and data security is one of the four major emerging risks within generative AI.
What is the difference between a day at the beach and managing a cyber risk assessment plan? Risk is not what happens or occurs after that risk materializes. The speakers also delve into notable topics about what risk is, what it is not, and how to analyze potential risks. A Data-Driven World and Navigating It.
I recently did this fun SANS webinar titled “Anton Chuvakin Discusses “20 Years of SIEM?—?What’s What’s Next?”” (the seemingly self-centered title was suggested by CardinalOps who organized the webinar). As it is common for SANS webinars , we got a lot of great questions that I feel like re-answering here for posterity.
3, 2024, CyberNewswire — An exclusive live webinar will take place on October 4th at noon Eastern Time (ET), demonstrating how Criminal IP’s Attack Surface Management (ASM) can help organizations proactively detect and mitigate cyber threats. Users can register now for the free webinar at 12PM ET on October 10 ? Torrance, Calif.,
Speaker: Ryan McInerny, CAMS, FRM, MSBA - Principal, Product Strategy
With 20% of Americans owning cryptocurrencies, speaking "fluent crypto" in the financial sector ensures you are prepared to discuss growth and risk management strategies when the topic arises. May 18th, 2023 at 9:30 am PDT, 12:30 pm EDT, 5:30 pm BST
Please join SiteLock for our next webinar as we examine the latest cybersecurity trends and data from our 2019 Website Security Report. The report analyzes more than 6 million websites to determine the most prevalent cyberthreats websites face today, and provides unique insight into the top website risk factors and emerging trends for 2019.
On the other end of this fencing match: risk. From IP leakage and data privacy risks to the empowering of cybercriminals with AI tools, generative AI There is broad agreement that tools like ChatGPT are unleashing waves of productivity across the business, from IT, to customer experience, to engineering. That's on the one hand.
Yet, these capabilities are exactly the ones that introduce serious security risks. Register to our upcoming webinar to learn how to prevent GenAI data Developers use it to write code, finance teams use it to analyze reports, and sales teams create customer emails and assets.
The popular video conferencing application Zoom implemented the new “At-Risk Meeting Notifier” feature to warn of Zoombombing threat. Zoom announced the launch a new feature dubbed “At-Risk Meeting Notifier” to warn conference organizers of potential Zoombombing attacks. Delete the existing meeting.
Speaker: Dr. Karen Hardy, CEO and Chief Risk Officer of Strategic Leadership Advisors LLC
Communication is a core component of a resilient organization's risk management framework. However, risk communication involves more than just reporting information and populating dashboards, and we may be limiting our skillset. Storytelling is the ability to express ideas and convey messages to others, including stakeholders.
In a recent webinar, Axio’s Global Co-founder and President, David White, sat down with American Gas Association’s Managing Director of Security and Operations, Kimberly Denbow, to discuss the latest release (v3) of API-1164, Pipeline Control Systems Cybersecurity, which is a NIST CSF-based community standard for cybersecurity regulation.
About the webinar. Currently, we assess that the risk of the cyber component of this conflict spilling over to Europe is medium-high. On March 10, 2022 Kaspersky’s Global Research and Analysis Team (GReAT) shared their insights into the current (and past) cyberattacks in Ukraine.
Top risk reporting is part of launch for any new cyber risk quantification program, and a look into the risk landscape that established programs return to for decision support. . The post Webinar on Demand: See RiskLens Enterprise Top Risk Reporting in Action appeared first on Security Boulevard.
In the digital age, where virtual meetings and webinars have become ubiquitous, Zoom Video Communications’ software, Zoom Meetings, stands out as a linchpin of virtual communication.
Speaker: Ronald Eddings, Cybersecurity Expert and Podcaster
In this webinar, Ronald Eddings, Cybersecurity Expert and Podcaster, will outline the interconnected relationship between SaaS apps and IT & security teams, along with several actionable solutions to overcome the new difficulties facing your organization.
So, we’ve compiled the highest rated, ranked by your peers, (ISC)² cybersecurity webinars from 2021. Our webinars have maintained consistent popularity and have have increased in viewership by more than 70% year-over-year growth this year. ISC)² members can receive CPE credits automatically for viewing webinars. Go Dox Yourself!
Last week, the Axio services team hosted a webinar roundtable on pragmatic cyber risk management. The presentation focused on what security professionals can do today to be prepared for the Read More The post A Recap of Our Pragmatic Cyber Risk Management Webinar appeared first on Axio.
A few days ago we did a very well-attended webinar focused on the modern Security Operations Center (SOC) approach (see “Trend for the Modern SOC” for a replay link). how does a company handle that risk? A: It’s not entirely clear what “risk-based” means here in your question. I think that is what I am hearing here.
On the road to risk management maturity, most organizations start with some kind of maturity framework, most likely the NIST Cybersecurity Framework (NIST CSF). Over time, organizations learn the differences between the FAIR™ (Factor Analysis of Information Risk) model and CSF risk assessments. see here for more details. ).
Speaker: William Hord, Vice President of ERM Services
In this webinar, you will learn how to: Outline popular change management models and processes. When an organization uses this information aggregately and combines it into a well-defined change management process, your ability to proactively manage change increases your overall effectiveness. Organize ERM strategy, operations, and data.
When will Adam Shostack be replaced by ChatGPT Irius Risk, a company specializing in automating threat modeling for software security, hosted a webinar on Machine Learning and Threat Modeling March 30, 2023. As of April 1st, Adam is already letting ML models, along with deepfake video, fill in for him on carefully selected webinars.
TrustCloud teamed up with Dansa D’Arata Soucia on our Risk Rodeo webinar, to discuss everything you need to know to wrangle up risks with confidence. The post What Your Auditor Looks for in Your Risk Management Process appeared first on Security Boulevard.
In todays rapidly evolving digital landscape, weak identity security isnt just a flawits a major risk that can expose your business to breaches and costly downtime. Many organizations are overwhelmed by an excess of user identities and aging systems, making them vulnerable to attacks.
From baby monitors to home security systems, these IoT products have become integral to daily life, yet they also present significant cybersecurity risks. By combining rigorous standards, public awareness, and industry collaboration, the program has the potential to significantly reduce the risks associated with IoT devices.
Every AI app is an opportunity—and a potential risk. From ordering coffee to diagnosing diseases, it’s everywhere. But while you’re creating the next big AI-powered app, hackers are already figuring out ways to break it. The stakes are huge: data leaks, downtime, and even safety threats if security
Later in the month, our founder Simon Moffatt, will host a webinar panel discussing the rise of NIS2 - what it is, how it impacts identity and security controls and risk management and what pragmatic steps organisations can take to become compliant. The post NIS2 Compliance: How to Get There appeared first on The Cyber Hut.
However, employees don't realize that this SaaS-to-SaaS connectivity, which typically takes place outside the view of the security team, significantly increases risk. Any app that can improve business operations is quickly added to the SaaS stack.
Baptist Health CISO James Case shared insights on transforming cybersecurity through a risk-focused lens at a recent webinar we hosted. The discussion was moderated by Axio President, David White and Read More The post Webinar Recap: Critical Concerns for Healthcare Providers in 2024 appeared first on Axio.
The Most Popular Data Security Webinars of 2022: Sovereignty, Cloud Security and Compliance Top the List. Throughout 2022, Thales hosted more than 40 webinars on a wide variety of cybersecurity topics, including, cloud security, data sovereignty, compliance, data threat trends, and rethinking approaches to role-based authentication.
The explosion of artificial intelligence tools has led to massive adoption of AI for technology and business tasks, enabling unprecedented productivity gains – but also introducing emerging risks for privacy and cybersecurity that are still little understood.
Join Ekran System for an insightful webinar with Jonathan Care, an established cybersecurity expert and former Gartner analyst, who will unveil powerful strategies for optimizing third-party vendor monitoring.
The “ Top Five Cybersecurity Predictions for 2022 ” webinar presented by Steve Piper, CISSP, Founder & CEO of CyberEdge overdelivers and gives us TEN predictions for the coming year. 7 – Boards Will Play More Active Role in Quantifying and Monitoring Cyber Risk. What does next year have in store for the cybersecurity industry?
This wave of innovation promises improved efficiency and performance, but lurking beneath the surface are complex vulnerabilities and unforeseen risks that demand immediate attention from cybersecurity professionals
Without these measures, organizations are at risk of experiencing data breaches, leaks, and significant financial losses. The interest in passwordless authentication has increased due to the rise of hybrid work environments and widespread digitization. This has led to a greater need for reliable data security and user-friendly interfaces.
Activities during this week include engaging workshops, informative webinars, and community events, all designed to empower individuals with the knowledge and skills necessary to navigate today’s cyber threats effectively. Promoting Cyber Hygiene Good cyber hygiene is about adopting habits that minimize security risks in everyday activities.
In the third part of our Summer of Software Regulations & Compliance webinar series , the Digital Operations Resilience Act (DORA) took center stage with Ilkka Turunen, Field CTO at Sonatype joining Friso Schutte, the CTO of fintech leader SurePay for a discussion on what financial service providers can do to prepare.
The post Webinar Recap: Analyzing and Reporting Risks for MSPs and MSSPs: Introducing Seceon aiSecurity Score360 and aiSecurity BI360 with Seceon and partner, Logically appeared first on Security Boulevard.
Recently, while co-hosting a webinar that kicked off Cybersecurity Awareness Month, a panelist commented that cybersecurity and privacy are team sports on a campus, much like our athletic teams. They see the investment in MFA as critical to a campus cybersecurity program and managing risk for a campus.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content