VIDEOS ON DEMAND

Our top industry experts weigh in on topics that could affect you and your organization

  • Threat Detection: Reducing the Time to Detect and Contain Cyber Incidents

    Modern threat detection is most successful when it is aligned to the organization’s risk management program. In this webinar we present a process to develop security analytics and monitoring from prioritized risk statements, with an emphasis on leveraging machine learning, behavior anomaly detection, and threat intelligence.

    In this webinar you will learn how to identify threat activities related to your company’s top risks and how to develop security analytics for enhanced threat detection.

  • Cyber Security Trends 2017

    How can organizations protect themselves against attacks and avoid data breaches.

    What will be the fundamental issues of cyber security in 2017? Topics covered include data protection, cloud security, and information security. We are in the midst of an era of significant data breaches. The result: More than ever, top management will play a key role. Frank Luzsicza, EVP, Information and Communication Technology at TÜV Rheinland, is convinced that “the amount and availability of sensitive information about people and connected systems will inevitably lead to increased pressure to update legacy cyber security risk strategies to the new attack surface”.

  • GRC Webinar – Quick Ins for Big Wins

    Digital business is vulnerable to cyber-attack, and large organizations typically have thousands of vulnerabilities.
    So with 60% of security budgets unable to keep up with rising threat levels, Risk Practitioners agree it’s critical to make investments based on real and quantifiable risk.

    This webinar discusses: Risk prioritization and GRC implementation strategies; a threat-based approach to risk management; how to prioritize your program to maximize efficiency and functionality; how to identify quick ‘power plays’ to launch a resilient GRC program; and gain valuable insight into key controls, and the roles of cyber governance and GRC.

  • Becoming a Risk Master

    Many organizations are challenged with balancing risk management with compliance management. Risk management considers threats while compliance focuses on controls without context. Ultimately you need to look at both ends of the equation to determine your key controls as they are the investments and associated metrics you want to nurture the most.

    But, what does this mean to the hundreds of other controls within the scope of your program or initiative? Are there compensating controls? Does the threat warrant more investment? How much investment?

  • Attack with the Power and Agility of the Cloud

    Digital transformation has been driving organizations to the Cloud. Seth Art will share how to use the power and agility of the Cloud to enhance your  Cyber Security Testing.

    Cyber Security Testing in the Cloud delivers advantages too costly to achieve using traditional methods. Seth will discuss how you can:

    • Quickly stand-up and tear-down attack specific infrastructure
    • Switch out IP addresses frequently, or switch whole attack infrastructures, to avoid attribution
    • Crack passwords in seconds for immediate use
    • Reduce costs, and much more!
  • A Threat-Based Approach to Prioritize your Cyber Risk

    In this webinar, OpenSky CISO, Mark Coderre, shares his experiences in taking a threat-based approach to cyber risk prioritization, which focuses investment decisions on the things that matter, and sets up the rest of your cyber security program for success!

    He will go on to discuss why cyber business risk can no longer be managed in spreadsheets, and share an approach to get you from where you are today, to making effective use of GRC automation.

  • Please complete form to download