All Security articles – Page 6
-
News
PrivSec London launches this week
PrivSec London opens this week to bring industry professionals to forefront of the global conversation on all things Data Protection, Privacy and Security.
-
News
Diversity, Equity & Inclusion leaders recognised as the inaugural Diversity, Equity & Inclusion in Tech Awards shortlist is revealed
The Diversity, Equity & Inclusion in Tech Awards is delighted to reveal the inaugural cohort of shortlisted individuals, teams, initiatives, and businesses for the 2023 Awards, comprising over 90 finalists across 14 categories.
-
Article
The GRC Red Flag Series – Excerpts from G(P)RC: How GRC Drives Performance in Banking & Finance
Excerpts from the panel discussion in the GRC Red Flag Series episode on September 15th, 2022, featuring Michael Rasmussen, GRC Pundit, GRC 20/20, Anja Ugedahl, Head of Business Performance Management-Sparebank 1 Nord-Norge, and Owe Lie-Bjelland, Director of GPRC Program, Corporater.
-
Training
ISO/IEC 27001:2022 and ISO/IEC 27002:2022, and how they affect your organisation
ISO/IEC 27001:2022 is the newest iteration of the international standard that sets out the specifications for an ISMS (information security management system).
-
Webinar
Leapfrog from SA&T compliance-as-a-strategy, to actual behavior & culture change
Security remains plagued with the legacy of compliance-driven, security awareness & training tools and methods.
-
Video
PrivSec Dublin 2022 highlights
PrivSec Dublin covered the most pressing and challenging topics from across the data protection, privacy and security sectors.
-
Webinar
Vendor Due Diligence: Best Practices for Scoping Assessments
With more and more vendors to onboard and monitor post-contract, third-party risk teams can struggleto keep up with the assessment workload. Ultimately, many organizations are asking too manyunnecessary questions or not enough necessary questions.
-
Webinar
Cybersecurity Threats: Know The Risks Your Third Parties Pose to Your Business and How to Defend Against Them
In 2021 alone there was a 62% global attack spike in ransomware, and it was made clear that the cyber threats are becoming not just more common, but also more sophisticated.
-
Webinar
After the attack: Mitigating Organisational Impact of a Data Breach? (LATAM region)
After the attack: Mitigating Organisational Impact of a Data Breach?
-
Article
Are You Ready For the Proposed Cyber Resilience Act?
The EU Commission’s proposal for a new Cyber Resilience Act (CRA) aims to safeguard consumers and businesses buying or using products or software with a digital component.
-
Video
The GRC Red Flag Series: G(P)RC - How GRC Drives Performance in Banking & Finance
Access the on-demand video for The GRC Red Flag Series with Michael Rasmussen: G(P)RC - How GRC Drives Performance in Banking & Finance
-
Webinar
The Human Element: Reducing Email Data Breaches By Combatting Human-Activated Risk
Did you know that 91% of cyberattacks are distributed by email and 82% of data breaches involve a human element?
-
Webinar
After the attack: There’s No Place for Guesswork in Cyber Attack Investigations (South Asia Edition)
You can’t ignore the headlines. We have seen that any organisation, at any time, can suffer a cybersecurity attack, resulting in a devastating data breach. It’s a question of “when” rather than “If”.
-
Webinar
Driving Accountability across the Organization with Cyber Risk Governance
Organisations are increasingly looking into setting a uniform standard for their cyber security programs that can sit across the entire structure. However, they first need to determine what standard is appropriate - and find a way to measure performance against it consistently.
-
Video
How to Manage Third-Party Risk in Your Supply Chain
Supply chain risks take many forms and can be devastating to your organisation if not properly mitigated. From cybersecurity to reputational and legal issues, managing risk among your vendors and other third parties can be a daunting task.
-
Video
Keeping Pace with Emerging Threats
Cyber criminals are leveraging innovative techniques and taking advantage of new security vulnerabilities. Organizations must evolve and adapt their defenses to protect against the next wave of cybersecurity threats.
-
Video
The human element: Fixing the behaviors that lead to breaches
Cybercriminals continue to launch increasingly sophisticated social engineering attacks. Coupled with a rise in human error, it’s no surprise that 85% of today’s security breaches involve a human element.
-
Video
Choosing the Right Cybersecurity Framework
Implementing a cybersecurity framework is a great way to improve your company’s security posture. But there are a lot of frameworks to choose from, and their suitability varies depending on your company’s industry, size and resources.
-
Video
How to Avoid Software Supply Chain Attacks
From Solarwinds to Kaseya to Log4j—the security risk from software supply chain attacks shows no sign of abating.