Information Security and ISO 27001
A Compliance Officer Turned Board Member's Advice
Cyberside Chats: Protect Your Crown Jewels – Nobody breaks into a bank to steal the posters
Unauthorized Access: An Inside Look at Incident Response
No Password Required: The Philosopher CISO of Tallahassee Who Lives to Help Other People
Cyberside Chats - Zero Trust and Cyber Negligence: A conversation with Dr. Zero Trust Chase Cunningham
No Password Required: A Former Police Officer Who Embodies All the Qualities of a Great Leader
Modernize your Information Governance: Building a Framework for Success
CyberSide Chats: Recap of the White House Cyber Summit (with Amanda Fennell)
Canna We Talk Cannabis? Cybersecurity Risks Bring Growing Pains to Cannabis Businesses
The Importance Of Cybersecurity During A Merger & Acquisition Transaction
Phishing and Vishing and Smishing (Oh my!): New Types of Scams Require Increased Vigilance
As AI adoption accelerates in healthcare, compliance, privacy, and risk teams are under pressure to adapt. Join experts from NAVEX and Granite GRC to learn how a proactive AI governance strategy can help you stay compliant,...more
Clearly defined roles and responsibilities are an essential component of an effective compliance program. Failure to adequately assign responsibility can lead to gaps in compliance coverage and a lack of accountability. ...more
Getting a successful risk management program off the ground can be daunting for even the most intrepid information security professionals. It doesn’t have to be rocket science. In this webinar, we’ll explore with guest...more
Learning Objectives: - Learn the technical dos and don’ts in implementing security compliance frameworks such as SOC 2, ISO 27001 and HIPAA - Discussion about why security compliance is so critical for organizations...more
Currently defense contractors who receive or create Controlled Unclassified Information (“CUI”) from or for the U.S. Department of Defense (“DoD”) are subject to several contract-based cybersecurity requirements, including...more
What is insider risk? Managing and minimising risk in your organisation starts with understanding the types of risks in the modern workplace. Some risks are driven by external events and factors that are outside of direct...more
October is cybersecurity awareness month. So, what better time than now to talk about the more detailed proposals emerging from the current administration to strengthen cybersecurity, and how compliance officers and CISOs...more
In many ways, the COVID-19 pandemic has served as a prime example of punctuated equilibrium. Shifts that have been slowly building for decades seemingly occurred overnight, giving us the contradictory sense that these changes...more
In February 2021, Virginia became the second state – after California – to enact state consumer data privacy legislation – the Virginia Consumer Data Protection Act (CDPA). During this webinar, we will analyze the CDPA. ...more
With state legislatures reconvening for 2021, numerous states already have seen California Consumer Privacy Act-like privacy legislation proposed, including Washington, New York and Minnesota. Other states are expected to...more