Risk Mitigation

Discover the latest collection of talks and videos on Risk Mitigation from industry experts.

Recent talks on Risk Mitigation

Connecting Audit and Risk to Drive Resilience
Channel Logo

Connecting Audit and Risk to Drive Resilience

Join us for an engaging fireside chat with Stellar Bank as they share their journey of connecting audit and risk management functions in a highly regulated
industry. Facing the challenges of a merger and the complexities of manual processes, Stellar Bank implemented a connected risk approach to enhance
collaboration, increase transparency, and drive strategic alignment. Through this discussion, you’ll learn how Stellar Bank is transforming its audit and risk …

From Phishing to Deepfakes: Staying Ahead in AI-Powered Cybercrime
Channel Logo

From Phishing to Deepfakes: Staying Ahead in AI-Powered Cybercrime

Despite Secure Email Gateways (SEGs) embracing AI, phishing still reaches the inboxes of users. Therefore, employees need to be able to identify attacks, a
skill they can learn with proper training. Join James Hickey, Senior Product Marketing Manager - Cofense, for this session to find out why trusting a
technology-only approach to email security can leave you dangerously exposed: • Discover why technology alone cannot fully detect or prevent phishing. •…

Cybersecurity Roundtable: Zero-Day Attacks, Exposing Weak Security Programs
Channel Logo

Cybersecurity Roundtable: Zero-Day Attacks, Exposing Weak Security Programs

In today's rapidly evolving cybersecurity landscape, the window of opportunity for hackers is alarmingly short. Recent data reveals that 61% of the time,
hackers leverage new exploit code within just 2 days. With such a narrow timeframe, how can organizations possibly stay ahead of these threats? Join us for
an insightful roundtable discussion on Zero-Day Exploits. Our expert panel will delve into the critical role of effective governance and the identification of thr…

From Chaos to Compliant: Demystifying Cyber Regulations
Channel Logo

From Chaos to Compliant: Demystifying Cyber Regulations

How many pieces of legislation are now important for cybersecurity and how should CISOs adapt? This session provides actionable insights into navigating
compliance challenges and leveraging policy changes as opportunities to strengthen existing security strategies.

Demo: How Hackers Think – The Anatomy of a Real-World Attack
Channel Logo

Demo: How Hackers Think – The Anatomy of a Real-World Attack

Walk through the anatomy of a real-world cyberattack with Rapid7 experts. See how attackers think, move, and exploit vulnerabilities—and how proactive
defences can stop them in their tracks.

Boost Operational Efficiency via a Privacy Risk Management Framework
Channel Logo

Boost Operational Efficiency via a Privacy Risk Management Framework

Establishing a privacy risk management framework will enable you to accurately report on the state of your privacy program, pinpoint needed program
enhancements or instances of noncompliance, and manage your internal governance in a structured and operationally efficient way. The structure needed
within the framework includes aligning 1) the risks your company faces, 2) the controls that mitigate those risks, 3) the laws you are required to comply wit…

Advancing Your Cyber Risk Maturity with ServiceNow
Channel Logo

Advancing Your Cyber Risk Maturity with ServiceNow

Managing cyber risk and maintaining compliance are key elements in creating more resilient digital operations, but they require upfront planning for
long-term success. State of Illinois GRC Manager, Steward Sandstrom will discuss how the organization is managing its cyber risk alongside ServiceNow
experts Shannon Long and Matt Powell. They’ll show how progressing in discrete stages can help build organizational capabilities, accelerating time to value…

Consolidating Risk Visibility to Build Business Efficiency & Resilience
Channel Logo

Consolidating Risk Visibility to Build Business Efficiency & Resilience

Today’s interconnected organizations face a rapidly evolving risk landscape where enterprise, cyber, operational, and third-party risks are increasingly
intertwined. The growing reliance on critical IT systems, both internally managed and outsourced to third and fourth parties, has expanded the attack
surface, leaving firms vulnerable to cyber incidents, downtime, and operational disruptions. Studies reveal that 87% of Fortune 1000 companies experience…

Attend Summits on Risk Mitigation

The 2023 Threatscape

The 2023 Threatscape

2023 will see organizations battle a more complex threatscape than ever before, with web application breaches continuing to rise, credential theft and
credential stuffing remaining a concern, and ransomware demands hitting the big players. As a result, it’s no wonder that CISOs and security practitioners a…

|37 sessions
Successfully Securing Endpoints & Mitigating Threats

Successfully Securing Endpoints & Mitigating Threats

Achieving endpoint visibility to ward off the threat of a breach has never been more important than it is in the age of data proliferation and hybrid
workplaces. Multiple endpoints and locations heighten that risk, making it essential for CISOs and IT security teams to overcome common challenges. Find o…

|19 sessions
Security & Risk in Fintech & Financial Services 2022

Security & Risk in Fintech & Financial Services 2022

Cybercrime damages are expected to rise to $6 trillion globally by the end of 2021. According to a recent report by the Boston Consulting Group, financial
institutions are 300 times more likely to be targeted by a cyber attack than any other company type. Join the figures driving the movement to advance secu…

|17 sessions
Complete Cloud Security

Complete Cloud Security

Cloud security accounted for 5% of cloud budgets in 2020 and is expected to rise to 7% in 2022, according to the "2022 State of IT" report by Spiceworks Ziff
Davis. No doubt caused by the shift to remote working provoked by the pandemic, it’s evident that cloud security is more top of IT security leaders’ minds t…

|16 sessions
The 2024 Threatscape

The 2024 Threatscape

Organizations must prepare for increasingly sophisticated and costly cybersecurity risks in the year ahead. While traditional methods of attack, such as
ransomware, malware, and email phishing, will persist, security strategies must now address emerging concerns like the growing prevalence of AI and the …

|15 sessions
The Impact of ESG on IT

The Impact of ESG on IT

The IT organization is critical to driving and achieving sustainability goals with green computing initiatives and informed procurement strategies.

|8 sessions

Watch series about Risk Mitigation

ServiceNow Cyber & Tech Risk
45 episodes
Series Company Logo

ServiceNow Cyber & Tech Risk

Monitor risk and compliance in real time on an integrated platform. Manage third-party risks and business continuity as you innovate.

Watch series

GRC & Me Podcast
23 episodes
Series Company Logo

GRC & Me Podcast

When Governance, Risk, and Compliance (GRC) issues are in the headlines, it’s usually a bad thing. It’s only when a major data breach happens, or a
company runs afoul of some regulation, that these important responsibilities get their time in the limelight. GRC & Me is here to shine a light on those indivi…

Watch series

Steps To TruRisk: A Five-step Framework for True Risk Management
5 episodes
Series Company Logo

Steps To TruRisk: A Five-step Framework for True Risk Management

Effective cybersecurity requires more than just patching vulnerabilities—it demands a strategic, risk-based approach. The Steps to TruRisk Series breaks
down the essential steps for prioritizing, assessing, and mitigating risk with Qualys TruRisk at the core. Hosted by Colton Pepper, Product Marketing Manager…

Watch series

Reduce IT Asset Cost and Risk
49 episodes
Series Company Logo

Reduce IT Asset Cost and Risk

Realize major savings and mitigate asset-related risk with the AI platform for business transformation.

Watch series

Cyber Risk Series – AI & LLM Edition: How Secure Are Your Generative Sheep?
6 episodes
Series Company Logo

Cyber Risk Series – AI & LLM Edition: How Secure Are Your Generative Sheep?

As AI and large language models (LLMs) rapidly transform industries, they also introduce new vulnerabilities that traditional cybersecurity methods can’t fully
address—data leaks, non-compliance, intellectual property theft, and more. In fact, 94% of IT leaders have allocated budgets to safeguard AI in 2024, and t…

Watch series

Risk Modeling: Quantify Cyber Insights for Effective Risk Management
7 episodes
Series Company Logo

Risk Modeling: Quantify Cyber Insights for Effective Risk Management

Enhance your cyber risk management process with actionable data through cyber risk modeling. Discover the insights you can leverage through the risk
models offered through the CyberStrong platform. Select between NIST 800-30, FAIR, and CyberInsight to distill clear and quantifiable data to drive risk m…

Watch series