Search results

Turn compliance challenges into competitive advantage

In today's challenging economic landscape, organizations face budget constraints, restructuring, and ever-evolving regulatory requirements. Join our
webinar, “Turn compliance challenges into competitive advantage,” where ServiceNow experts will provide actionable guidance on how to overcome these
growing demands with existing staff, and how to leverage automation and GenAI to reduce costs and improve operational efficiency. You'll leave knowing: …

Connecting Audit and Risk to Drive Resilience

Join us for an engaging fireside chat with Stellar Bank as they share their journey of connecting audit and risk management functions in a highly regulated
industry. Facing the challenges of a merger and the complexities of manual processes, Stellar Bank implemented a connected risk approach to enhance
collaboration, increase transparency, and drive strategic alignment. Through this discussion, you’ll learn how Stellar Bank is transforming its audit and risk …

How To Prepare for AI, Privacy, and the Cyber Regulatory Tsunami

Data privacy, data protection, and regulatory compliance are more critical than ever. As data continues to multiply at the speed of light, how do you find the
right balance between innovation and staying secure and compliant? Moreover, what does data governance look like today? And what is the right level of
governance? This conversation between Chris Hetner, our CXO advisor and former cyber advisor to the SEC, and Cyera’s Head of Risk and Incident Respo…

Understanding Container Security: Common Misconfigurations

Containerized applications and microservices simplify scaling and deployment. Yet, they also create new opportunities for attackers to exploit.
Misconfigurations in these environments can allow attackers to hide, move, and launch advanced attacks. Join us for a deep dive into common container
misconfigurations. We'll dive into Black Duck’s extensive experience in container penetration testing. What you’ll learn: • Common misconfigurations f…

Scaling Trust in Finance and Payments Using AI

AI has become integral to the operations of public and private sector institutions as the fabric of the applications people use to deliver value every day. Rapid
digitization has created a deluge of data. Organizations need to be able to triage information, figure out what and who is important, and manage risk. There
is an expectation by regulators, governments, and businesses that organizations use AI to extract valuable insights, discover connections, and understand i…

Embracing the Future of Cybersecurity with NIST CSF 2.0

In February 2024, the NIST Cybersecurity Framework (CSF) 2.0 update was released, featuring the latest advancements. This update brings a host of
transformative changes, expanding the framework's scope. It also provides stronger governance and supply chain risk management. There are also refining
metrics for assessing cybersecurity effectiveness. Join this webinar to learn about • The long-anticipated CSF 2.0 update • The implications of the changes …

Cybersecurity Roundtable: Zero-Day Attacks, Exposing Weak Security Programs

In today's rapidly evolving cybersecurity landscape, the window of opportunity for hackers is alarmingly short. Recent data reveals that 61% of the time,
hackers leverage new exploit code within just 2 days. With such a narrow timeframe, how can organizations possibly stay ahead of these threats? Join us for
an insightful roundtable discussion on Zero-Day Exploits. Our expert panel will delve into the critical role of effective governance and the identification of thr…

STRONGER 2024: Building an Effective Cyber Risk Program to Drive Business Growth - APAC

See how Rob Nolan, CISO at Expeditors, built the company's cyber risk management strategy in this session from STRONGER 2024. Rob discussed his
challenges and successes while building a comprehensive cyber risk program. He dove into the critical role of quantifying risk and scenario planning, which
paved the way for effective risk management and communication with his C-Suite and Board of Directors. Rob highlighted how Expeditors aligns cyber initia…

Grouping Extractable and Leachable (E&L) Compounds with a Common Mechanism of Action for
Toxicological Risk Assessment

The toxicological risk assessment of E&L compounds is typically conducted on a compound-by-compound basis; however, for compounds that lack toxicity
data, it may be useful to group compounds together that have similar structural and physical-chemical properties, as well as a similar toxicological
mechanism of action, to derive a class-specific Tolerable Intake (TI) or Permitted Daily Exposure (PDE) that is applicable for all compounds in that group. Thi…

Boost Operational Efficiency via a Privacy Risk Management Framework

Establishing a privacy risk management framework will enable you to accurately report on the state of your privacy program, pinpoint needed program
enhancements or instances of noncompliance, and manage your internal governance in a structured and operationally efficient way. The structure needed
within the framework includes aligning 1) the risks your company faces, 2) the controls that mitigate those risks, 3) the laws you are required to comply wit…