GRC Conference Virtual Event
ISACA and The IIA are pleased to once again collaborate to bring you the 2020 Governance, Risk, and Control (GRC) Virtual Conference.
ISACA and The IIA are pleased to once again collaborate to bring you the 2020 Governance, Risk, and Control (GRC) Virtual Conference.
The COVID-19 pandemic has forced organizations to adapt to the new realities of remote work, social distancing, and alternative working arrangements. The new policies introduced to govern these situations have stretched the limits of existing technology and operating capabilities—creating increasing exposure to existing and new IT risks
Controlled Unclassified Information (CUI) is an integral component of any DOD contract, and protecting the security of this information is every DOD contractor’s responsibility. CUI is critical to managing and protecting our nation’s Intellectual Property (IP). The DOD estimates over $600 billion are lost every year to data exfiltration, and that’s why CMMC and the […]
Data protection is a core principle of any security strategy and requires visibility into data-at-rest and data-in-motion for effective data loss protection (DLP) policies and rules. Combine this objective with the overwhelming use of cloud apps freely adopted by business units and users, as well as the increasing number of remote workers and the end […]
2020 is poised to be the most critical security landscape for elections – locally, nationally, and globally – and this issue will continue to grow and become more complex. Voter data is at risk of compromise, misinformation is rampant, and security issues – real or perceived – will remain regardless of regulation. What data analytics, […]
Don’t miss THE data security event of the year for the payment card industry. Although we will not be together face-to-face, we will still gather virtually to hear important Council updates, regional insights, startling industry reports and are creating an engaging agenda for this multiday virtual event. The North America Community Meeting continues to be […]
The Covid-19 pandemic has had a profound effect on almost every aspect of our life: how we work, how we travel, how we shop and how we interact with our friends and families. Even more jarring is that this change happened in a matter of weeks or months, and we still face a great deal […]
Ransomware attacks have come back with a vengeance. More than half of organizations admitted to being hit by ransomware in the last year at an eye-watering average remediation cost of $761,106 per attack. One of the most effective methods for protecting against ransomware attacks like Ryuk, Sodinokibi, Maze, and Ragnar Locker is to fortify your […]
Adopted globally by governments, private sector enterprises and academia, the CIS Benchmarks are critically important for establishing and maintaining a strong, effective foundation for all of your cyber efforts. By attending this webinar, you will gain insight into how the CIS Benchmarks are developed, why they matter, and effective strategies and approaches for using the […]
URGENT UPDATE: THE NEW DFARS INTERIM RULE HAS BEEN RELEASED AND GOES INTO EFFECT NOVEMBER 30, 2020! Don't miss this opportunity to get the latest information on the DoD's new DFARS rules and the rollout of the Cybersecurity Maturity Model Certification (CMMC) program, directly from CMMC program director Katie Arrington. The Cyber Collaboration Center is […]
At the Cyber Security Summit, our mission is to produce a multi-stakeholder consortium that brings together industry, government and academic interests in an effort to improve the state of cyber security on both a domestic and international level.
In this webinar, we’ll talk about and illustrate how a common set of data can help both teams work and address cybersecurity requirements together. Join us to learn: • Why packet capture and flow analysis are important to cybersecurity response and remediation • How to complement existing protection, detection, and response tools using packet capture […]
Would you like for your event to be displayed on the events calendar? Submit cybersecurity related events using our event submission form.