The accreditors of this session require that you periodically check in to verify that you are still attentive.
Please click the button below to indicate that you are.
Analyze recent industry survey results and CEO statistics to determine why we need to focus on cyber risk now. You’ll gain an understanding of risk metrics, starting with risk appetite. Learn how to set thresholds in line with risk appetite, construct risk metrics and go through the build process. Explore how effective risk reporting drives risk decisions.
Executives and boards should ensure they understand the potential multijurisdictional conflicts that may arise from differing privacy and data protection laws around the globe…
Recently, data surpassed oil as the world's most valuable asset. Current data protection methods have too many dependencies on systems and networks through which data passes. So far, attempts to solve this problem have not adequately minimized external dependencies…
A major problem with cybersecurity programs today: CISOs get the budgets they’re believed to deserve, not the budgets they need. Cybersecurity program design and budgeting is traditionally driven by the current program and budget, and any enhancements are based on this set…
Delve into the challenges of securing remote endpoints. This session will cover device management, secure access, data protection and employee training. By analyzing real-world case studies and best practices, you’ll gain actionable insights for protecting remote endpoints…