Webinars and Presentations

Demystifying IT Risk Assessments

Risk Assessments are widely recognized as an essential step in the IT risk management process. Yet, most organizations struggle to maintain IT risk assessment programs that ensure that the greatest risks to business operations are identified and addressed on a continuing basis.
Learn how to implement an intelligent risk assessment program that evolves with your information security landscape and delivers actionable information to meet the needs of your risk management program.

Blueprint for a Modern Vendor Risk Management Program

For security professionals knowledge of imminent risks and threats can mean the difference between securing your virtual borders and incurring a catastrophic breach. If your organization deals with external entities, then your most vulnerable aspects may not be protected by your security policies. Implementing a comprehensive vendor risk management program enables you to identify, monitor and manage risks associated with external interactions.

Application Software Risk – Going Beyond Code Analysis

Have you implemented the static and dynamic code analysis processes, but are not sure how to prioritize discovered vulnerabilities? Have you encouraged your developers to use Free and Open Source Software (FOSS), but don’t know how it impacts your security? Do you find your business doesn’t want to commit resources to remediate cross-site scripting or SQL injections due to lack of understanding?