USA
Select regional store:

Cybersecurity webinars

An organization’s survival is increasingly dependent on its ability to prepare for, respond to, and recover from cyber attacks.

Cybersecurity helps organizations protect themselves from cyber risks, defend against and limit the severity of attacks, and ensure that business operations continue to function effectively.

Upcoming webinars

Stage 2 – Protection: The second layer of your cyber defence-in-depth strategy

Date: Wednesday, October 5, 2022

Time: 10:00 – 10:45am (EDT)

Delivered by: Alan Calder, Founder and Executive Chairman, IT Governance and GRC International Group

Protecting an organisation from the increasing threat of cyber attacks can be challenging. Employees are a crucial line of defence, and ensuring they know their security responsibilities and how to spot a cyber attack is critical.

Depending on the organisation, it may not need to implement extensive security measures, but at least a base level of security is essential. Certification to security schemes can protect an organisation from the most common cyber threats and publicly demonstrate its commitment to cyber security.

Read more

Stage 3 – Management: The third layer of your cyber-defence-in-depth strategy

Date: Thursday, October 20, 2022

Time: 10:00 – 10:45am (EDT)

Delivered by: Alan Calder, Founder and Executive Chairman of IT Governance and CEO of GRC International Group

When it comes to larger or more complex organisations, managing cyber security risks requires a more intensive approach than implementing basic security protection.

Embedding risk-based security controls, managing the security of supply chains and carrying out regular audits are some of the many measures an organisation may need to take to manage and reduce risk.

Read more

Stage 4 – Response: The fourth layer of your cyber-defence-in-depth strategy

Date: Wednesday, November 16, 2022

Time: 10:00 – 10:45am (EDT)

Delivered by: Alan Calder, Founder and Executive Chairman of IT Governance and CEO of GRC International Group

Implementing a cyber security incident response management plan means you won’t waste valuable time when the worst happens.

Cyber incident response is a part of wider business continuity management. It helps you put plans in place to cover all types of unplanned disruption, from cyber security incidents to natural disasters, from power outages to pandemics.

This is especially important when it comes to breaches of personal data, which may need to be reported to the data protection authorities within 72 hours of being discovered under the DPA (Data Protection Act) 2018 and GDPR (General Data Protection Regulation).

Read more

Stage 5 – Recovery: The final layer of your cyber defence-in-depth strategy

Date: Wednesday, December 7, 2022 

Time: 10:00 – 10:45am (EDT)

Delivered by: Alan Calder, Founder and Executive Chairman, IT Governance and GRC International Group

Recovering from a cyber attack or data breach can be more disruptive than an organisation has planned for.

Most of the time, an organisation can restore enough critical services to be able to continue functioning, but it can take months to fully return to business as usual. Having cyber insurance in place can give organisations peace of mind, providing cover when they need it most and helping them get back to business as usual as soon as possible.

Read more

Cybersecurity webinars on demand

Stage 1 – Detection: The first layer of your cyber defense-in-depth strategy

Delivered by: Alan Calder, founder and executive chairman, IT Governance & GRC International Group

Understanding the threats you face and where your cyber defences are most at risk of being breached is critical to securing your organisation against cyber attacks.

By implementing detection measures your can identify security flaws, enabling you to bolster defences where needed.

Read more

Flash briefing: The growing importance of implementing a cyber-defense-in-depth strategy

Delivered by: Alan Calder, Founder and Executive Chairman, IT Governance 

With new vulnerabilities being identified constantly, understanding your organization’s security weaknesses is paramount. The current political climate also means that organizations have been urged to bolster their cybersecurity defenses and tactics as the Russian invasion of Ukraine continues.

Get peace of mind that your organization is safe and secure with a cyber-defence-in-depth strategy. This should involve regularly testing your firewalls and external-facing services and training your staff to identify and respond to phishing attacks.

Read more

Webinar: New cyber incident reporting obligations that you need to be aware of in the EU and US

Delivered by: Alan Calder, Founder and Executive Chairman, IT Governance & GRC International Group

On March 1, the US Senate passed the Strengthening American Cybersecurity Act of 2022, which requires organizations to report any personal data breaches within 72 hours of the incident taking place. This aligns with the requirements of the GDPR.

In addition, the proposed EU corporate accountability rules require directors to take on new data protection responsibilities.

Read more

Flash briefing: Cyber warfare and the threat of escalating cyber aggression

Delivered by: Alan Calder, Founder and Executive Chairman, IT Governance & GRC International Group

As Russia continues to focus on the battle for Ukraine by disrupting and destroying Ukrainian computers and networks, NATO states are taking the threat of Russian cyber aggression very seriously and have issued a number of warnings for organizations to tighten their security.

Read more

Flash briefing: The cyber security implications of Russia invading Ukraine

Delivered by: Alan Calder, Founder and Executive Chairman, IT Governance and GRC International Group

The tensions between Russia and Ukraine have led to reports warning organizations to improve their cybersecurity defences, as fears grow that cyber attacks linked to the conflict could move beyond Ukraine’s borders.

Read more

Panel discussion: How to prevent and respond to the most successful vulnerabilities exploited by attackers

Panellists:

  • Adam Seamons, Systems & Security Engineer, GRC International Group
  • James Pickard, Security Testing Manager, IT Governance
  • Cliff Martin, Cyber Incident Responder, GRCI Law

Existing and emerging vulnerabilities exploited by cyber criminals hit the headlines daily. With cyber criminals using a combination of web-based exploit kits and planned and targeted sophisticated attacks, organizations are under more pressure than ever to put in place controls and measures to identify threats and reduce their impact.

Read more

Flash briefing: How to avoid data breaches caused by human error

Delivered by: Alan Calder, Executive Chairman of IT Governance

According to Verizon’s 2021 Data Breaches Investigations Report, 85% of data breaches involved a human element. It’s clear that many organizations are struggling to handle the threat that their own staff present.

With staff moving to remote or hybrid working during the pandemic, the challenge of containing human error is greater than ever. Data breaches can be caused by something as simple as accidentally emailing an internal document to a client.

Read more

FLASH BRIEFING: 20 minutes on how to prevent phishing attacks

Delivered by: Alan Calder, Founder and Executive Chairman of IT Governance

According to Verizon’s 2021 Data Breach Investigations Report, 43% of data breaches in the past year occurred due to phishing attacks and/or pretexting.

IBM’s 2021 research into the cost of a data breach ranks phishing attacks as the second most expensive cause of data breaches, costing businesses an average of $4.65 million.

Read more

FLASH BRIEFING: How to Navigate and Implement a Successful Hybrid Workforce

Delivered by: Alan Calder, Founder and Executive Chairman, IT Governance

A hybrid working model gives staff the choice to work in an office, at home, or in shared working spaces.

With 90% of organizations intending to shift to hybrid working where possible after the COVID-19 pandemic, remote workers will be even more susceptible to cyber threats, in some cases creating huge cybersecurity and privacy compliance challenges.

Read more

FLASH BRIEFING: Navigate to Cyber Safety – Security Testing

Cyber crime has thrived during the pandemic, with the move to remote working offering new opportunities for attackers to exploit human vulnerabilities and digital systems. Last year, 85% of breaches involved a human element, and attacks on web applications represented 39% of all breaches.

It is therefore more important than ever for organizations to understand how secure their network is against external threats and cyber attacks.

Read more

FLASH BRIEFING: Navigate to Cyber Safety – Ransomware

Presenters:

  • Alan Calder, Founder and Executive Chairman;
  • James Pickard, Security Testing Manager; and
  • Cliff Martin, Cyber Incident Responder.

61% of organisations have been hit by a ransomware attack over the past 12 months (Mimecast 2021).

Join this 20-minute flash briefing, during which our team of cyber experts will dissect two of the major ransomware attacks that have hit the headlines this month. They will offer a high-level overview and practical advice on how these attacks could have been mitigated – and what your organisation needs to do to avoid suffering the same fate. Our experts will examine:

Read more

CMMC: An Overview and New Developments

Presenter: Preston Bukaty, Consultant, IT Governance USA

According to the U.S. DoD (Department of Defense), the CMMC (Cybersecurity Maturity Model Certification) is “a unified cybersecurity standard for future DoD acquisitions.” The CMMC will serve as a tiered certification scheme to help the DoD assess cybersecurity readiness when seeking suppliers and subcontractors. 

The CMMC reviews and combines various cybersecurity standards and best practices to help contractors map controls and processes across five maturity levels that range from basic cyber hygiene to advanced. Join Preston Bukaty in this webinar where he will give an overview of the CMMC and discuss any exciting developments around this new cybersecurity standard.

In this webinar, Preston Bukaty will cover the following topics: 

  • An overview of the CMMC
  • Audit and assessment – the certification process outlined
  • How the CMMC differs from other cybersecurity standards
  • Which contractors and subcontractors need to comply
  • Future requirements – how to prepare now

Cybersecurity Issues with Teleconferencing Tools

The COVID-19 pandemic has led to an unprecedented number of people working from home, and a surge in the use of tools such as Zoom, Signal, and Microsoft Teams to help employees communicate.  

Assessing whether these tools are secure has become a top priority. 

Zoom in particular has come under fire for not implementing privacy by design, thereby exposing users and organizations to a significant number of threats.  

In this webinar, our cybersecurity expert William Gamble discusses the legal requirements around electronic communication, and the vulnerabilities and threats that these teleconferencing tools expose organizations to. The webinar covers: 

  • Conferencing tools and their security configurations
  • HIPAA (Health Insurance Portability and Accountability Act) requirements for risk assessments
  • Other statutory considerations including the CCPA (California Consumer Privacy Act), the BIPA (Biometric Information Privacy Act), and other U.S. cybersecurity or privacy laws

CMMC: Cybersecurity Certification for US Government Contractors

Delivered by Preston Bukaty, GDPR Consultant.

Due to growing concern that DOD subcontractors are not aware of or cannot adequately meet their security obligations for managing sensitive data, the OUSD(A&S) (Office of the Under Secretary of Defense for Acquisition and Sustainment) introduced the CMMC (Cybersecurity Maturity Model Certification) to help contractors demonstrate eligibility to work with the U.S. government.

The CMMC reviews and combines various cybersecurity standards and best practices to help contractors map controls and processes across five maturity levels that range from basic cyber hygiene to advanced.

Join us for this webinar to get insights into:

  • The CMMC draft and measures for safeguarding government information
  • A new certification scheme – an overview of the draft CMMC
  • Five levels – an in-depth review of the practices and processes
  • Audit and assessment – the certification process outlined
  • The key steps to compliance
  • Future requirements – how to prepare now

Adapting to COVID-19 – Cybersecurity considerations

In these unprecedented circumstances, cyber criminals are coming up with new ways to carry out attacks and exploit fears around the uncertainties of COVID-19.

Creating an effective cyber risk strategy to mitigate the risk of cyber crime is the only way to ensure your organization’s survival.

In this webinar, William Gamble discusses:

  • Types and examples of phishing attacks in the current COVID-19 climate
  • Cybersecurity tips for staff working at home
  • Implementing a staff security awareness program
  • Key measures to reduce risks and prevent cyber attacks

Online panel discussion – COVID-19 Cyber Risk and Data Privacy Response

The sudden global shift to remote working has brought unprecedented changes to social and work habits, and introduced new cyber risks and data privacy challenges that affect the way organizations need to operate.

As most employees are working from home, they may be accessing and processing information outside the organization’s normal security perimeter, which increases the risk of a data breach. With cyber criminals employing sophisticated phishing tactics and malicious websites to target staff by impersonating credible information sources around COVID-19, organizations need to implement security measures to address these challenges.

Read more

This website uses cookies. View our cookie policy