US companies selling products or services to the EU must comply with the EU General Data Protection Regulation (GDPR) as of May 25, 2018. IoT device manufacturers face unique challenges to comply with the privacy and security components of the GDPR.
This webinar presents key concepts and real-world examples of approaches IoT device manufacturers should consider when preparing to sell to the EU, including a summary of GDPR requirements and who needs to comply.
Cybersecurity attacks of operational technology and industrial control networks are up. Repeatedly, production lines are halted and intellectual property is stolen. In this webinar, find out how to measure your operational technology and industrial security risk.
Find out how to apply the NIST Cybersecurity Framework and IEC 62443 in your business. Learn how to build a safe, cyber-resilient production facility, and protect your IP and supply chain data.
Modern threat detection is most successful when it is aligned to the organization’s risk management program. In this webinar we present a process to develop security analytics and monitoring from prioritized risk statements, with an emphasis on leveraging machine learning, behavior anomaly detection, and threat intelligence.
In this webinar you will learn how to identify threat activities related to your company’s top risks and how to develop security analytics for enhanced threat detection.
How can organizations protect themselves against attacks and avoid data breaches.
What will be the fundamental issues of cyber security in 2017? Topics covered include data protection, cloud security, and information security. We are in the midst of an era of significant data breaches. The result: More than ever, top management will play a key role. Frank Luzsicza, EVP, Information and Communication Technology at TÜV Rheinland, is convinced that “the amount and availability of sensitive information about people and connected systems will inevitably lead to increased pressure to update legacy cyber security risk strategies to the new attack surface”.
Digital business is vulnerable to cyber-attack, and large organizations typically have thousands of vulnerabilities.
So with 60% of security budgets unable to keep up with rising threat levels, Risk Practitioners agree it’s critical to make investments based on real and quantifiable risk.
This webinar discusses: Risk prioritization and GRC implementation strategies; a threat-based approach to risk management; how to prioritize your program to maximize efficiency and functionality; how to identify quick ‘power plays’ to launch a resilient GRC program; and gain valuable insight into key controls, and the roles of cyber governance and GRC.
Many organizations are challenged with balancing risk management with compliance management. Risk management considers threats while compliance focuses on controls without context. Ultimately you need to look at both ends of the equation to determine your key controls as they are the investments and associated metrics you want to nurture the most.
But, what does this mean to the hundreds of other controls within the scope of your program or initiative? Are there compensating controls? Does the threat warrant more investment? How much investment?