Compliance

Discover the latest collection of talks and videos on Compliance from industry experts.

Recent talks on Compliance

Optimizing Today’s Defenses, Securing Tomorrow’s Innovation
Channel Logo

Optimizing Today’s Defenses, Securing Tomorrow’s Innovation

As AI permeates every facet of digital life, the importance of data privacy has never been greater. Presented by SoftwareOne and Microsoft, learn how to
optimally safeguard your digital estate while embracing responsible innovation, tackling critical topics from zero trust architectures to defending against
AI-powered cyber threats. In this session, you'll learn: - How to build a modern, resilient security posture - Principles of zero trust and defense against AI-…

Unlocking Digital Trust: Why Hardware Security Modules Are Essential for Modern Business
Channel Logo

Unlocking Digital Trust: Why Hardware Security Modules Are Essential for Modern Business

In today’s digital-first world, trust is everything. But how do organizations ensure the integrity, confidentiality, and authenticity of their most sensitive data and
transactions? Enter the Hardware Security Module (HSM)—a critical yet often overlooked component of enterprise security. Join us for this introductory
webinar where we demystify HSMs and explore how they underpin secure digital transformation. Whether you're in finance, healthcare, government, or an…

From Audit Headaches to Automated Compliance: Streamlining Data Governance
Channel Logo

From Audit Headaches to Automated Compliance: Streamlining Data Governance

SaaS adoption introduces compliance blind spots – stale data, ungoverned file sharing, and inconsistent controls across cloud apps. In this session, explore
how Forcepoint’s Data Security Everywhere approach enables continuous compliance by automating sensitive data classification, surfacing risks to regulated
data such as public exposure, providing remediation workflows, and enforcing data loss controls.

HSMs: Critical Infrastructure to Establish Trust and Integrity
Channel Logo

HSMs: Critical Infrastructure to Establish Trust and Integrity

Organizations struggle with accelerating digital transformation while balancing demands of protecting corporate assets and complying with ever changing
regulations. Join us to explore how industry leaders are leveraging HSM (Hardware Security Modules) to add a robust level of security to their technology
infrastructure. HSMs provide enhanced key generation, digital signing, and encryption to protect sensitive key material and the transactions that use it. Join…

Cyber Security Workshop 02: CIS Compliance Simplified
Channel Logo

Cyber Security Workshop 02: CIS Compliance Simplified

Is CIS compliance hard? Or Herculean? Compliance is a critical aspect of cybersecurity, and if performed incorrectly, it can bring a lot of trouble during
audits. Fines, reputational and business impact, just to name a few. CIS compliance is one major policy that organizations around the world refer to secure,
comply, and enhance their security posture. But, how do you do it effectively? How do you implement compliance without spending millions of dollars and …

Cybersecurity Regulations: GLBA, CMMC & HIPAA – Ensuring Compliance: Who, Why, How, and When?
Channel Logo

Cybersecurity Regulations: GLBA, CMMC & HIPAA – Ensuring Compliance: Who, Why, How, and When?

Panel discussion on regulatory requirements and how to adhere them. Selling security/compliance inside your organization. You will gain insights on the
"Why's" the "How's and the "When's" And of course the gotcha's if you don't. Enjoy!

Investigations Evolved: How Case IQ Transformed Our Case Management Strategy
Channel Logo

Investigations Evolved: How Case IQ Transformed Our Case Management Strategy

Managing investigations can be complex especially when juggling multiple intake streams, bespoke processes, and the need for consistent, data-driven
outcomes. In this session, we’ll explore the most common challenges organizations face in managing investigations and how Case IQ’s case management
software helps solve them. From streamlining case intake to automating workflows and triage, attendees will see how the right tools can bring order and i…

Automate Compliance, Cut Downtime: Smarter Infrastructure with Chef
Channel Logo

Automate Compliance, Cut Downtime: Smarter Infrastructure with Chef

Financial institutions face relentless pressure to secure operations, maintain compliance, and respond instantly to incidents—while keeping costs in check.
Manual processes, siloed tools, and compliance drift create risk exposure, service downtime, and mounting operational costs. Join us to see how the
Progress Chef empowers teams to: -Automate compliance aligned with CIS and DISA STIG benchmarks. -Orchestrate jobs across complex hybrid environm…

Coming up next

[NA] Command and Control: Running a Modern SOC with AI-Powered SIEM
Channel Logo

[NA] Command and Control: Running a Modern SOC with AI-Powered SIEM

Since the formal start of the SIEM market more than two decades ago, SOC analysts have been frustrated by an overwhelming number of alerts and
underwhelming technology to detect and rectify them. Today, while the technology has improved, it still falls short in many areas. AI has begun to make its
way into next-generation SIEM solutions. However, cyber attackers have also made liberal use of AI technology to dramatically increase the breadth, compl…

[NA] Top Cybersecurity Predictions for 2026
Channel Logo

[NA] Top Cybersecurity Predictions for 2026

Rapid technological innovation is reshaping the cybersecurity threat landscape at an unprecedented pace. Alongside AI’s continuing evolution and the rise in
advanced cybercriminal networks, growing geopolitical instability, shifting regulations, and the potentially disruptive effects of quantum computing are
redefining how organizations must approach security in 2026. Join us on December 10th for Rapid7’s annual Cybersecurity Predictions webinar to hear ex…

Google Cloud EMEA Cybersecurity Forecast 2026 in Italiano
Channel Logo

Google Cloud EMEA Cybersecurity Forecast 2026 in Italiano

Le minacce informatiche sono in continua evoluzione. Scopri come stare al passo nel 2026 con l'esperto di sicurezza Gabriele Zanoni. Partecipa a questa
sessione di approfondimento basata sul report "Cybersecurity Forecast 2026", dove Gabriele esporrà le tendenze chiave e le intuizioni per aiutarti a
rafforzare le tue difese informatiche nell'anno a venire, tra cui: -La Corsa agli Armamenti dell'IA: Come l'IA generativa viene utilizzata sia dagli attaccanti c…

Du Shadow IT aux identités sécurisées : pourquoi les agents IA ont besoin de gouvernance
Channel Logo

Du Shadow IT aux identités sécurisées : pourquoi les agents IA ont besoin de gouvernance

Les agents d’IA transforment notre manière de travailler — mais ils apportent aussi de nouveaux défis en matière de sécurité et d’identités. Dans ce
webinar, découvrez pourquoi ces agents doivent être considérés comme de nouvelles identités numériques et comment les gérer efficacement. Nous
verrons : • Comment savoir à quels agents IA vos équipes ont accès, • Quels outils ces agents peuvent utiliser, • Et comment éviter tout accès non autorisé…

Sichern Sie, was für Ihr Business zählt – mit SonicSentry MDR for Cloud.
Channel Logo

Sichern Sie, was für Ihr Business zählt – mit SonicSentry MDR for Cloud.

From email to Slack and Salesforce, modern businesses run on cloud apps — but their built-in security only goes so far. Kicking off the year, January’s CAFÉ
TECH session to see how SonicSentry MDR for Cloud pairs advanced technology with expert SOC monitoring to deliver continuous protection across your
cloud environments. You’ll discover how 24/7 threat detection and response can stop attackers before they move deeper into networks, flag anomalous ad…

Asegura lo que impulsa tu negocio — con SonicSentry MDR para Cloud.
Channel Logo

Asegura lo que impulsa tu negocio — con SonicSentry MDR para Cloud.

From email to Slack and Salesforce, modern businesses run on cloud apps — but their built-in security only goes so far. Kicking off the year, January’s CAFÉ
TECH session to see how SonicSentry MDR for Cloud pairs advanced technology with expert SOC monitoring to deliver continuous protection across your
cloud environments. You’ll discover how 24/7 threat detection and response can stop attackers before they move deeper into networks, flag anomalous ad…

World Tax 2027 – Completing your submission
Channel Logo

World Tax 2027 – Completing your submission

World Tax's Head of Research John Harrison updates you on all the changes to the research process and forms for the World Tax 2027 rankings and 2026
awards. The presentation will conclude with a live Q&A where John will answer any additional questions you may have that are not answered by the
presentation.

Accelerating IT/OT Convergence with ServiceNow and Wind River
Channel Logo

Accelerating IT/OT Convergence with ServiceNow and Wind River

In today’s rapidly evolving industrial landscape, bridging the gap between Information Technology (IT) and Operational Technology (OT) is transforming
business operations, unlocking new levels of efficiency, resilience, and innovation. Join industry experts from ServiceNow and Wind River for a 45-minute
deep dive into the future of IT/OT convergence and discover how leading enterprises are leveraging hybrid cloud platforms, AI-driven automation, and unifi…

Attend Summits on Compliance

Data Security Risks and Challenges

Data Security Risks and Challenges

A surge in attacks and breaches, coupled with more stringent regulations, means your data security practices must evolve to keep pace

|13 sessions
Data Protection Strategies and Trends

Data Protection Strategies and Trends

In a world where data is both the lifeblood and a potential liability, staying ahead of data protection trends is vital. The exponential growth of data breaches
and cyberattacks, coupled with ever-evolving regulations, demands a proactive data protection strategy. Discover how to safeguard sensitive information, c…

|14 sessions
Security Strategies to Safeguard the Enterprise

Security Strategies to Safeguard the Enterprise

Cybersecurity initiatives are taking center stage as enterprises race to digitally transform and satisfy heightened customer expectations while simultaneously
securing hybrid workforces. As businesses continue to emerge from the COVID-19 pandemic, revamp their business models, and restructure operations, a …

|14 sessions
Securing Financial Data and Services

Securing Financial Data and Services

Financial institutions and fintechs face unprecedented challenges in securing sensitive customer data. Cyberattacks targeting payment systems, account
information, and mobile banking applications are increasingly sophisticated, and the regulatory landscape is evolving faster than ever. The shift to digital se…

|7 sessions
Comprehensive Strategies for Data Protection

Comprehensive Strategies for Data Protection

We live in a world where data is both essential and risky, so staying on top of data protection practices is critical. Attend our virtual Summit and discover
strategies and methods to help you keep your organization’s sensitive information safe and in compliance with changing laws and regulations. Join your pe…

|8 sessions
Modern Storage Management

Modern Storage Management

Explore new capabilities in storage and backup that increase effectiveness, improve security and leverage the cloud.

|10 sessions

Watch series about Compliance

ServiceNow Cyber & Tech Risk
50 episodes
Series Company Logo

ServiceNow Cyber & Tech Risk

Monitor risk and compliance in real time on an integrated platform. Manage third-party risks and business continuity as you innovate.

Watch series

Modernizing software compliance in Life Sciences
5 episodes
Series Company Logo

Modernizing software compliance in Life Sciences

Accelerate critical approval, verification, and compliance management processes while ensuring FDA compliance with Tricentis Vera, a leading solution to
enhance Digital Validation. Unlike traditional e-signature and document-centric processes, Vera enhances the software validation process with an approach …

Watch series

Compliance Bites: 5 takeaways from 'Beyond the Checkbox' panel discussion
5 episodes
Series Company Logo

Compliance Bites: 5 takeaways from 'Beyond the Checkbox' panel discussion

This short series distills the Panaseer original webinar “Beyond the Checkbox: A CISO Perspective on Continuous Compliance” into five bite-sized highlight
reels - each one under five minutes - so you can absorb the essentials to continuous compliance and controls assurance automation. Every episode zeroes…

Watch series

Navigating Compliance in a Zero Trust World With DORA, NIS2 & PCI DSS 4.0: On Demand Masterclass
3 episodes
Series Company Logo

Navigating Compliance in a Zero Trust World With DORA, NIS2 & PCI DSS 4.0: On Demand Masterclass

This series guides you through the complexities of NIS2 and DORA regulations, prepares you for PCI DSS 4.0 compliance, and shows you how to integrate
these requirements seamlessly into a Zero Trust framework. Perfect for IT professionals and compliance officers, you'll gain practical strategies and insights…

Watch series

Diligent Master Class for CCOs
6 episodes
Series Company Logo

Diligent Master Class for CCOs

Diligent Master Class for CCOs is a one-of-a-kind program that provides actionable advice and frameworks for today’s compliance leaders. Designed with
inputs from experienced CCOs who’ve built, scaled and run compliance programs for diverse industries across the globe, the Master Class series equips CC…

Watch series

Building a Resilient Identity Compliance Framework
5 episodes
Series Company Logo

Building a Resilient Identity Compliance Framework

Your identity landscape should be sporting the most robust IAM strategy for ultimate regulation compliance and risk mitigation. But patching together this tool
and that tool can lead to security gaps that threat actors can sneak through. Join us to discover the ways an identity fabric and non-human identities will he…

Watch series