Search results

Detect and Respond to Data Risk with Forcepoint DDR

Forcepoint Data Detection and Response (DDR). enables continuous data monitoring, so you can spot the warning signs that lead to breaches: Get visibility
into data movement and usage by identifying risky data as it’s created, uncovering high-risk user activity and detecting signs of insider threats before they
happen. Forcepoint DDR delivers: - Comprehensive Monitoring: Continuously detect and log data creation, use and movement both in the cloud and on en…

Executive Briefing - Radware Threat Analysis Report

Radware’s latest Threat Analysis Report is published in March 2025, revealing the latest cyber threats, attack trends, and security challenges organizations
must prepare for. This executive briefing, is your opportunity to get all the key findings—directly from the report’s author, Pascal Geenens, Director of Cyber
Threat Intelligence at Radware. Pascal will share key insights from the newly published report, offering an expert analysis of the most significant security ev…

STRONGER 2024: Leveraging AI Tools in Cyber Risk and Compliance: Pitfalls to Avoid and Best Practices
to Embrace - APAC

In the evolving landscape of cybersecurity, integrating AI tools such as Microsoft Copilot and ChatGPT offers promising enhancements for cyber risk
management and compliance. This discussion from STRONGER 2024, featuring Dr. Fortune Onwuzuruike, provided an in-depth discussion on the strategic
implementation of AI in cybersecurity programs. Attendees gained valuable insights into common pitfalls to avoid alongside actionable best practices to opt…

STRONGER 2024: Building an Effective Cyber Risk Program to Drive Business Growth - EMEA

See how Rob Nolan, CISO at Expeditors, built the company's cyber risk management strategy in this session from STRONGER 2024. Rob discussed his
challenges and successes while building a comprehensive cyber risk program. He dove into the critical role of quantifying risk and scenario planning, which
paved the way for effective risk management and communication with his C-Suite and Board of Directors. Rob highlighted how Expeditors aligns cyber initia…

Transforming Cyber Risk Operations and Board Oversight with the Govern Function - APAC

As AI transforms business and cyber processes across all industries, it is imperative to understand the intersection of the new NIST CSF “Govern” function and
AI governance. This webinar will provide a comprehensive overview of how the principles of governance within the NIST CSF can be effectively aligned with AI
governance practices to enhance organizational security and compliance. We will begin by exploring the key components of the NIST CSF “Govern” functio…

Advancing Your Cyber Risk Maturity with ServiceNow

Managing cyber risk and maintaining compliance are key elements in creating more resilient digital operations, but they require upfront planning for
long-term success. State of Illinois GRC Manager, Steward Sandstrom will discuss how the organization is managing its cyber risk alongside ServiceNow
experts Shannon Long and Matt Powell. They’ll show how progressing in discrete stages can help build organizational capabilities, accelerating time to value…

Why AI Needs Its Own Risk Management Policies and Processes

Existing risk management policies, and the related business processes, which may have been appropriate for the traditional information technology
environment, will not be workable in the AI environment. In this presentation, we’ll discuss what’s markedly different between the traditional information
technology risk management environment, and the new AI risk management environment. For example, there is a risk of model stealing with publicly facin…

Transforming Cyber Risk Operations and Board Oversight with the Govern Function - EMEA

As AI transforms business and cyber processes across all industries, it is imperative to understand the intersection of the new NIST CSF “Govern” function and
AI governance. This webinar will provide a comprehensive overview of how the principles of governance within the NIST CSF can be effectively aligned with AI
governance practices to enhance organizational security and compliance. We will begin by exploring the key components of the NIST CSF “Govern” functio…

Collaborative Auditing: Engaging Internal Stakeholders for Better Outcomes

In today’s complex risk landscape, engaging internal stakeholders effectively is crucial for timely and impactful audit results. Misaligned communication,
siloed data, and inconsistent follow-up can all contribute to delays and reduced accountability across departments. By leveraging technology to streamline
workflows, automate reminders, and consolidate documentation, organizations can foster better stakeholder collaboration and more efficient risk manage…

Cyber Risk Quantification: Measuring and Managing the Unseen Threats

As cyber threats continue to grow in complexity, organizations are more vulnerable to significant risks. Yet, many struggle to measure and manage these
unseen dangers effectively. On this CPE webinar our panel of subject matter experts will explore the essentials of cyber risk quantification - a transformative
approach that translates technical cybersecurity risks into business terms. Attendees will discover how organizations can assess their financial exposure to …