Recent talks on Risk Mitigation


Connecting Audit and Risk to Drive Resilience
Join us for an engaging fireside chat with Stellar Bank as they share their journey of connecting audit and risk management functions in a highly regulated
industry. Facing the challenges of a merger and the complexities of manual processes, Stellar Bank implemented a connected risk approach to enhance
collaboration, increase transparency, and drive strategic alignment. Through this discussion, you’ll learn how Stellar Bank is transforming its audit and risk …


From Phishing to Deepfakes: Staying Ahead in AI-Powered Cybercrime
Despite Secure Email Gateways (SEGs) embracing AI, phishing still reaches the inboxes of users. Therefore, employees need to be able to identify attacks, a
skill they can learn with proper training. Join James Hickey, Senior Product Marketing Manager - Cofense, for this session to find out why trusting a
technology-only approach to email security can leave you dangerously exposed: • Discover why technology alone cannot fully detect or prevent phishing. •…


Cybersecurity Roundtable: Zero-Day Attacks, Exposing Weak Security Programs
In today's rapidly evolving cybersecurity landscape, the window of opportunity for hackers is alarmingly short. Recent data reveals that 61% of the time,
hackers leverage new exploit code within just 2 days. With such a narrow timeframe, how can organizations possibly stay ahead of these threats? Join us for
an insightful roundtable discussion on Zero-Day Exploits. Our expert panel will delve into the critical role of effective governance and the identification of thr…


From Chaos to Compliant: Demystifying Cyber Regulations
How many pieces of legislation are now important for cybersecurity and how should CISOs adapt? This session provides actionable insights into navigating
compliance challenges and leveraging policy changes as opportunities to strengthen existing security strategies.


Boost Operational Efficiency via a Privacy Risk Management Framework
Establishing a privacy risk management framework will enable you to accurately report on the state of your privacy program, pinpoint needed program
enhancements or instances of noncompliance, and manage your internal governance in a structured and operationally efficient way. The structure needed
within the framework includes aligning 1) the risks your company faces, 2) the controls that mitigate those risks, 3) the laws you are required to comply wit…


Advancing Your Cyber Risk Maturity with ServiceNow
Managing cyber risk and maintaining compliance are key elements in creating more resilient digital operations, but they require upfront planning for
long-term success. State of Illinois GRC Manager, Steward Sandstrom will discuss how the organization is managing its cyber risk alongside ServiceNow
experts Shannon Long and Matt Powell. They’ll show how progressing in discrete stages can help build organizational capabilities, accelerating time to value…


Consolidating Risk Visibility to Build Business Efficiency & Resilience
Today’s interconnected organizations face a rapidly evolving risk landscape where enterprise, cyber, operational, and third-party risks are increasingly
intertwined. The growing reliance on critical IT systems, both internally managed and outsourced to third and fourth parties, has expanded the attack
surface, leaving firms vulnerable to cyber incidents, downtime, and operational disruptions. Studies reveal that 87% of Fortune 1000 companies experience…
Attend Summits on Risk Mitigation
The 2023 Threatscape
2023 will see organizations battle a more complex threatscape than ever before, with web application breaches continuing to rise, credential theft and
credential stuffing remaining a concern, and ransomware demands hitting the big players. As a result, it’s no wonder that CISOs and security practitioners a…
Successfully Securing Endpoints & Mitigating Threats
Achieving endpoint visibility to ward off the threat of a breach has never been more important than it is in the age of data proliferation and hybrid
workplaces. Multiple endpoints and locations heighten that risk, making it essential for CISOs and IT security teams to overcome common challenges. Find o…
Security & Risk in Fintech & Financial Services 2022
Cybercrime damages are expected to rise to $6 trillion globally by the end of 2021. According to a recent report by the Boston Consulting Group, financial
institutions are 300 times more likely to be targeted by a cyber attack than any other company type. Join the figures driving the movement to advance secu…
Complete Cloud Security
Cloud security accounted for 5% of cloud budgets in 2020 and is expected to rise to 7% in 2022, according to the "2022 State of IT" report by Spiceworks Ziff
Davis. No doubt caused by the shift to remote working provoked by the pandemic, it’s evident that cloud security is more top of IT security leaders’ minds t…
The 2024 Threatscape
Organizations must prepare for increasingly sophisticated and costly cybersecurity risks in the year ahead. While traditional methods of attack, such as
ransomware, malware, and email phishing, will persist, security strategies must now address emerging concerns like the growing prevalence of AI and the …
The Impact of ESG on IT
The IT organization is critical to driving and achieving sustainability goals with green computing initiatives and informed procurement strategies.
Watch series about Risk Mitigation

ServiceNow Cyber & Tech Risk
Monitor risk and compliance in real time on an integrated platform. Manage third-party risks and business continuity as you innovate.

GRC & Me Podcast
When Governance, Risk, and Compliance (GRC) issues are in the headlines, it’s usually a bad thing. It’s only when a major data breach happens, or a
company runs afoul of some regulation, that these important responsibilities get their time in the limelight. GRC & Me is here to shine a light on those indivi…

Steps To TruRisk: A Five-step Framework for True Risk Management
Effective cybersecurity requires more than just patching vulnerabilities—it demands a strategic, risk-based approach. The Steps to TruRisk Series breaks
down the essential steps for prioritizing, assessing, and mitigating risk with Qualys TruRisk at the core. Hosted by Colton Pepper, Product Marketing Manager…

Reduce IT Asset Cost and Risk
Realize major savings and mitigate asset-related risk with the AI platform for business transformation.

Cyber Risk Series – AI & LLM Edition: How Secure Are Your Generative Sheep?
As AI and large language models (LLMs) rapidly transform industries, they also introduce new vulnerabilities that traditional cybersecurity methods can’t fully
address—data leaks, non-compliance, intellectual property theft, and more. In fact, 94% of IT leaders have allocated budgets to safeguard AI in 2024, and t…

Risk Modeling: Quantify Cyber Insights for Effective Risk Management
Enhance your cyber risk management process with actionable data through cyber risk modeling. Discover the insights you can leverage through the risk
models offered through the CyberStrong platform. Select between NIST 800-30, FAIR, and CyberInsight to distill clear and quantifiable data to drive risk m…