On-Demand Webinars

Webinars presented by respected thought leaders on critical business topics.
 Obtain latest information about information security, risk management, compliance, and data privacy. Get up to date tips and stay informed. Register below to listen, engage and obtain:
  • Actionable advice in 30 minutes from respected industry experts
  • Keep pace with the latest issues that impact Business, IT and Security
  • Listen to speakers who will explore different aspects of the business by relating their own experiences
The Fluid Ecosystem of Risk Management – Speaker: Paola Saibene

Risk and innovation go hand in hand in an increasingly demanding market. Various risk functions in an organization can benefit from aligning & supporting each other, so that they can operate as one towards the mitigation of risk, while building a sustainable ecosystem. Risk and innovation go hand in hand in an increasingly demanding market.

• Find out how we can get our arms around successfully managing security, privacy, risk and audit
• Find out what is the root cause for most successful security breaches and operational outages
• Find out what how the changing regulatory landscape is creating critical problems for the deployment of business IT solutions

Fluid Ecosystem
Why scoping is key to CMMC certification success – Speaker: Russell Cowdrey

The DoD is mandating that all contractors that conduct business with the DoD, have to obtain Cybersecurity Maturity Model Certification (CMMC). In this webinar, Russell will discuss what CMMC is about and how to prepare for it. He will also cover how to figure out the scope of effort required to pass the CMMC assessment and also provide some valuable recommendations for completing the CMMC project.

We delve into the mind games and tactics used by experts, revealing the secrets behind this intriguing form of psychological manipulation. From the basics of human hacking to advanced strategies, our comprehensive guide demystifies the world of social engineering, providing you with the knowledge to protect yourself against these hidden tactics.

Social Engineering
Metrics That Matter – Speaker: Paola Saibene

In an increasingly data-saturated world, what are the core metrics that Information Security or Risk Management leaders should present when communicating the state of security at their organization? Many executive leaders struggle to prioritize things they can’t measure or quantify. This is why, for these leaders, identifying and agreeing upon cybersecurity metrics is very important.

Metrics