article thumbnail

Webinar | 4 Actions to Secure Work from Home Employees

Data Breach Today

This informational webinar will outline 4 actions you can take today to keep employees secure and productive during these challenging times, with tips straight from your identity and access management peers. IT resources are being stretched to mobilize an urgent shift to remote access and remote work.

Security 227
article thumbnail

OnDemand Webinar | Fighting Fraud With Connected Security

Data Breach Today

How to Get Started in Implementing a More Connected Security Strategy View this webinar and learn how to fight fraud with a connected security strategy.

Security 162
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

OnDemand Webinar | Using Security Ratings to Achieve Security Goals

Data Breach Today

How Ratings Can Be Leveraged To Improve Security Performance And Vendor Risk Management Watch this OnDemand webinar and learn how ratings be leveraged to improve security performance and vendor risk management.

Security 147
article thumbnail

Live Webinar | Software Security: Prescriptive vs. Descriptive

Data Breach Today

Effective software security means enabling the development team with the tools and training it needs to fix what they find. Join this session to find out best practices in remediating software vulnerabilities in smart ways.

Security 307
article thumbnail

Your Team's Pragmatic Guide to Security

Speaker: Naresh Soni, CTO, Tsunami XR

The pandemic has led to new data vulnerabilities, and therefore new cyber security threats. As technology leaders, it's time to rethink some of your product security strategy. Whether you need to rework your security architecture, improve performance, and/or deal with new threats, this webinar has you covered.

article thumbnail

OCR Webinar on The HIPAA Security Rule Risk Analysis Requirement Webinar on October 31st at 3pm EST

IG Guru

DEPARTMENT OF HEALTH AND HUMAN SERVICES Office for Civil Rights _ October 24, 2023 OCR Webinar on The HIPAA Security Rule Risk Analysis Requirement Threats and vulnerabilities to electronic protected health information (ePHI) in today’s healthcare environment are numerous and varied.

Risk 74
article thumbnail

OnDemand Webinar | The Third Question: What CISOs Aren't Asking, and What's at Stake

Data Breach Today

Watch this webinar with renowned cybersecurity innovator and former CISO of Citi, JP Morgan, and Deutsche Bank, Charles Blauner to lean about the biggest challenges facing security teams today.

article thumbnail

Shift Left Security? Development Does Not Want to Own It.

Speaker: Shlomo Bielak, CTO, Benchmark Corp

Shifting security left to the earliest part of development is currently in the spotlight in the developer world. What teams are now discovering is, this approach results in misdirected ownership for developers and a frustrated security team. In the current climate, we cannot afford to let security implementations falter.

article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Bales, Esq.

article thumbnail

Cover Your SaaS: How to Overcome Security Challenges and Risks For Your Organization

Speaker: Ronald Eddings, Cybersecurity Expert and Podcaster

And despite your SaaS adoption offering many positives, there is now an exponential increase in IT, security, and business complexity. By focusing on SaaS security posture management, your team can finally accomplish the following: Discover both known and unknown SaaS apps.

article thumbnail

Recovering from a Cyber Attack

Speaker: Mike Cramer, Director of HIPAA & Data Security at The Word & Brown Companies

If your organization stores data and is connected to the Internet, it is not a matter of “if” a cyber-security incident will happen, but “when.” It takes an organizational mindset which realizes that data privacy and security is a continuous, evolving process, as opposed to a “fire-and-forget” set of steps.

article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

In this exclusive webinar with industry visionaries, you'll learn: The value of Software Composition Analysis Regulations impacting both software producers and buyers What a Software Bill of Materials is and why you need one Software supply chain security best practices.and more! Register today!