Recent talks on Compliance
Optimizing Today’s Defenses, Securing Tomorrow’s Innovation
As AI permeates every facet of digital life, the importance of data privacy has never been greater. Presented by SoftwareOne and Microsoft, learn how to
optimally safeguard your digital estate while embracing responsible innovation, tackling critical topics from zero trust architectures to defending against
AI-powered cyber threats. In this session, you'll learn: - How to build a modern, resilient security posture - Principles of zero trust and defense against AI-…
Unlocking Digital Trust: Why Hardware Security Modules Are Essential for Modern Business
In today’s digital-first world, trust is everything. But how do organizations ensure the integrity, confidentiality, and authenticity of their most sensitive data and
transactions? Enter the Hardware Security Module (HSM)—a critical yet often overlooked component of enterprise security. Join us for this introductory
webinar where we demystify HSMs and explore how they underpin secure digital transformation. Whether you're in finance, healthcare, government, or an…
From Audit Headaches to Automated Compliance: Streamlining Data Governance
SaaS adoption introduces compliance blind spots – stale data, ungoverned file sharing, and inconsistent controls across cloud apps. In this session, explore
how Forcepoint’s Data Security Everywhere approach enables continuous compliance by automating sensitive data classification, surfacing risks to regulated
data such as public exposure, providing remediation workflows, and enforcing data loss controls.
HSMs: Critical Infrastructure to Establish Trust and Integrity
Organizations struggle with accelerating digital transformation while balancing demands of protecting corporate assets and complying with ever changing
regulations. Join us to explore how industry leaders are leveraging HSM (Hardware Security Modules) to add a robust level of security to their technology
infrastructure. HSMs provide enhanced key generation, digital signing, and encryption to protect sensitive key material and the transactions that use it. Join…
Cyber Security Workshop 02: CIS Compliance Simplified
Is CIS compliance hard? Or Herculean? Compliance is a critical aspect of cybersecurity, and if performed incorrectly, it can bring a lot of trouble during
audits. Fines, reputational and business impact, just to name a few. CIS compliance is one major policy that organizations around the world refer to secure,
comply, and enhance their security posture. But, how do you do it effectively? How do you implement compliance without spending millions of dollars and …
Cybersecurity Regulations: GLBA, CMMC & HIPAA – Ensuring Compliance: Who, Why, How, and When?
Panel discussion on regulatory requirements and how to adhere them. Selling security/compliance inside your organization. You will gain insights on the
"Why's" the "How's and the "When's" And of course the gotcha's if you don't. Enjoy!
Investigations Evolved: How Case IQ Transformed Our Case Management Strategy
Managing investigations can be complex especially when juggling multiple intake streams, bespoke processes, and the need for consistent, data-driven
outcomes. In this session, we’ll explore the most common challenges organizations face in managing investigations and how Case IQ’s case management
software helps solve them. From streamlining case intake to automating workflows and triage, attendees will see how the right tools can bring order and i…
Automate Compliance, Cut Downtime: Smarter Infrastructure with Chef
Financial institutions face relentless pressure to secure operations, maintain compliance, and respond instantly to incidents—while keeping costs in check.
Manual processes, siloed tools, and compliance drift create risk exposure, service downtime, and mounting operational costs. Join us to see how the
Progress Chef empowers teams to: -Automate compliance aligned with CIS and DISA STIG benchmarks. -Orchestrate jobs across complex hybrid environm…
Coming up next
[NA] Command and Control: Running a Modern SOC with AI-Powered SIEM
Since the formal start of the SIEM market more than two decades ago, SOC analysts have been frustrated by an overwhelming number of alerts and
underwhelming technology to detect and rectify them. Today, while the technology has improved, it still falls short in many areas. AI has begun to make its
way into next-generation SIEM solutions. However, cyber attackers have also made liberal use of AI technology to dramatically increase the breadth, compl…
[NA] Top Cybersecurity Predictions for 2026
Rapid technological innovation is reshaping the cybersecurity threat landscape at an unprecedented pace. Alongside AI’s continuing evolution and the rise in
advanced cybercriminal networks, growing geopolitical instability, shifting regulations, and the potentially disruptive effects of quantum computing are
redefining how organizations must approach security in 2026. Join us on December 10th for Rapid7’s annual Cybersecurity Predictions webinar to hear ex…
Google Cloud EMEA Cybersecurity Forecast 2026 in Italiano
Le minacce informatiche sono in continua evoluzione. Scopri come stare al passo nel 2026 con l'esperto di sicurezza Gabriele Zanoni. Partecipa a questa
sessione di approfondimento basata sul report "Cybersecurity Forecast 2026", dove Gabriele esporrà le tendenze chiave e le intuizioni per aiutarti a
rafforzare le tue difese informatiche nell'anno a venire, tra cui: -La Corsa agli Armamenti dell'IA: Come l'IA generativa viene utilizzata sia dagli attaccanti c…
Du Shadow IT aux identités sécurisées : pourquoi les agents IA ont besoin de gouvernance
Les agents d’IA transforment notre manière de travailler — mais ils apportent aussi de nouveaux défis en matière de sécurité et d’identités. Dans ce
webinar, découvrez pourquoi ces agents doivent être considérés comme de nouvelles identités numériques et comment les gérer efficacement. Nous
verrons : • Comment savoir à quels agents IA vos équipes ont accès, • Quels outils ces agents peuvent utiliser, • Et comment éviter tout accès non autorisé…
Sichern Sie, was für Ihr Business zählt – mit SonicSentry MDR for Cloud.
From email to Slack and Salesforce, modern businesses run on cloud apps — but their built-in security only goes so far. Kicking off the year, January’s CAFÉ
TECH session to see how SonicSentry MDR for Cloud pairs advanced technology with expert SOC monitoring to deliver continuous protection across your
cloud environments. You’ll discover how 24/7 threat detection and response can stop attackers before they move deeper into networks, flag anomalous ad…
Asegura lo que impulsa tu negocio — con SonicSentry MDR para Cloud.
From email to Slack and Salesforce, modern businesses run on cloud apps — but their built-in security only goes so far. Kicking off the year, January’s CAFÉ
TECH session to see how SonicSentry MDR for Cloud pairs advanced technology with expert SOC monitoring to deliver continuous protection across your
cloud environments. You’ll discover how 24/7 threat detection and response can stop attackers before they move deeper into networks, flag anomalous ad…
World Tax 2027 – Completing your submission
World Tax's Head of Research John Harrison updates you on all the changes to the research process and forms for the World Tax 2027 rankings and 2026
awards. The presentation will conclude with a live Q&A where John will answer any additional questions you may have that are not answered by the
presentation.
Accelerating IT/OT Convergence with ServiceNow and Wind River
In today’s rapidly evolving industrial landscape, bridging the gap between Information Technology (IT) and Operational Technology (OT) is transforming
business operations, unlocking new levels of efficiency, resilience, and innovation. Join industry experts from ServiceNow and Wind River for a 45-minute
deep dive into the future of IT/OT convergence and discover how leading enterprises are leveraging hybrid cloud platforms, AI-driven automation, and unifi…
Attend Summits on Compliance
Data Security Risks and Challenges
A surge in attacks and breaches, coupled with more stringent regulations, means your data security practices must evolve to keep pace
Data Protection Strategies and Trends
In a world where data is both the lifeblood and a potential liability, staying ahead of data protection trends is vital. The exponential growth of data breaches
and cyberattacks, coupled with ever-evolving regulations, demands a proactive data protection strategy. Discover how to safeguard sensitive information, c…
Security Strategies to Safeguard the Enterprise
Cybersecurity initiatives are taking center stage as enterprises race to digitally transform and satisfy heightened customer expectations while simultaneously
securing hybrid workforces. As businesses continue to emerge from the COVID-19 pandemic, revamp their business models, and restructure operations, a …
Securing Financial Data and Services
Financial institutions and fintechs face unprecedented challenges in securing sensitive customer data. Cyberattacks targeting payment systems, account
information, and mobile banking applications are increasingly sophisticated, and the regulatory landscape is evolving faster than ever. The shift to digital se…
Comprehensive Strategies for Data Protection
We live in a world where data is both essential and risky, so staying on top of data protection practices is critical. Attend our virtual Summit and discover
strategies and methods to help you keep your organization’s sensitive information safe and in compliance with changing laws and regulations. Join your pe…
Modern Storage Management
Explore new capabilities in storage and backup that increase effectiveness, improve security and leverage the cloud.
Watch series about Compliance
ServiceNow Cyber & Tech Risk
Monitor risk and compliance in real time on an integrated platform. Manage third-party risks and business continuity as you innovate.
Modernizing software compliance in Life Sciences
Accelerate critical approval, verification, and compliance management processes while ensuring FDA compliance with Tricentis Vera, a leading solution to
enhance Digital Validation. Unlike traditional e-signature and document-centric processes, Vera enhances the software validation process with an approach …
Compliance Bites: 5 takeaways from 'Beyond the Checkbox' panel discussion
This short series distills the Panaseer original webinar “Beyond the Checkbox: A CISO Perspective on Continuous Compliance” into five bite-sized highlight
reels - each one under five minutes - so you can absorb the essentials to continuous compliance and controls assurance automation. Every episode zeroes…
Navigating Compliance in a Zero Trust World With DORA, NIS2 & PCI DSS 4.0: On Demand Masterclass
This series guides you through the complexities of NIS2 and DORA regulations, prepares you for PCI DSS 4.0 compliance, and shows you how to integrate
these requirements seamlessly into a Zero Trust framework. Perfect for IT professionals and compliance officers, you'll gain practical strategies and insights…
Diligent Master Class for CCOs
Diligent Master Class for CCOs is a one-of-a-kind program that provides actionable advice and frameworks for today’s compliance leaders. Designed with
inputs from experienced CCOs who’ve built, scaled and run compliance programs for diverse industries across the globe, the Master Class series equips CC…
Building a Resilient Identity Compliance Framework
Your identity landscape should be sporting the most robust IAM strategy for ultimate regulation compliance and risk mitigation. But patching together this tool
and that tool can lead to security gaps that threat actors can sneak through. Join us to discover the ways an identity fabric and non-human identities will he…