Select regional store:

Cybersecurity webinars

An organization’s survival is increasingly dependent on its ability to prepare for, respond to, and recover from cyber attacks.

Cybersecurity helps organizations protect themselves from cyber risks, defend against and limit the severity of attacks, and ensure that business operations continue to function effectively.

Upcoming webinars

Flash briefing: Cyber warfare and the threat of escalating cyber aggression

Delivered by: Alan Calder, Founder and Executive Chairman, IT Governance & GRC International Group

Date: Thursday, 19 May 2022

Time: 10:00 – 10:30am (EST)

As Russia continues to focus on the battle for Ukraine by disrupting and destroying Ukrainian computers and networks, NATO states are taking the threat of Russian cyber aggression very seriously and have issued a number of warnings for organizations to tighten their security.

Read more

Webinar: New cyber incident reporting obligations that you need to be aware of in the EU and US

Delivered by: Alan Calder, Founder and Executive Chairman, IT Governance & GRC International Group

Date: Tuesday, 24 May 2022

Time: 11:00 – 11:45am (EST)

On March 1, the US Senate passed the Strengthening American Cybersecurity Act of 2022, which requires organizations to report any personal data breaches within 72 hours of the incident taking place. This aligns with the requirements of the GDPR.

In addition, the proposed EU corporate accountability rules require directors to take on new data protection responsibilities.

Read more

Cybersecurity webinars on demand

Flash briefing: The cyber security implications of Russia invading Ukraine

Delivered by: Alan Calder, Founder and Executive Chairman, IT Governance and GRC International Group

The tensions between Russia and Ukraine have led to reports warning organizations to improve their cybersecurity defences, as fears grow that cyber attacks linked to the conflict could move beyond Ukraine’s borders.

Read more

Panel discussion: How to prevent and respond to the most successful vulnerabilities exploited by attackers


  • Adam Seamons, Systems & Security Engineer, GRC International Group
  • James Pickard, Security Testing Manager, IT Governance
  • Cliff Martin, Cyber Incident Responder, GRCI Law

Existing and emerging vulnerabilities exploited by cyber criminals hit the headlines daily. With cyber criminals using a combination of web-based exploit kits and planned and targeted sophisticated attacks, organizations are under more pressure than ever to put in place controls and measures to identify threats and reduce their impact.

Read more

Flash briefing: How to avoid data breaches caused by human error

Delivered by: Alan Calder, Executive Chairman of IT Governance

According to Verizon’s 2021 Data Breaches Investigations Report, 85% of data breaches involved a human element. It’s clear that many organizations are struggling to handle the threat that their own staff present.

With staff moving to remote or hybrid working during the pandemic, the challenge of containing human error is greater than ever. Data breaches can be caused by something as simple as accidentally emailing an internal document to a client.

Read more

FLASH BRIEFING: 20 minutes on how to prevent phishing attacks

Delivered by: Alan Calder, Founder and Executive Chairman of IT Governance

According to Verizon’s 2021 Data Breach Investigations Report, 43% of data breaches in the past year occurred due to phishing attacks and/or pretexting.

IBM’s 2021 research into the cost of a data breach ranks phishing attacks as the second most expensive cause of data breaches, costing businesses an average of $4.65 million.

Read more

FLASH BRIEFING: How to Navigate and Implement a Successful Hybrid Workforce

Delivered by: Alan Calder, Founder and Executive Chairman, IT Governance

A hybrid working model gives staff the choice to work in an office, at home, or in shared working spaces.

With 90% of organizations intending to shift to hybrid working where possible after the COVID-19 pandemic, remote workers will be even more susceptible to cyber threats, in some cases creating huge cybersecurity and privacy compliance challenges.

Read more

FLASH BRIEFING: Navigate to Cyber Safety – Security Testing

Cyber crime has thrived during the pandemic, with the move to remote working offering new opportunities for attackers to exploit human vulnerabilities and digital systems. Last year, 85% of breaches involved a human element, and attacks on web applications represented 39% of all breaches.

It is therefore more important than ever for organizations to understand how secure their network is against external threats and cyber attacks.

Read more

FLASH BRIEFING: Navigate to Cyber Safety – Ransomware


  • Alan Calder, Founder and Executive Chairman;
  • James Pickard, Security Testing Manager; and
  • Cliff Martin, Cyber Incident Responder.

61% of organisations have been hit by a ransomware attack over the past 12 months (Mimecast 2021).

Join this 20-minute flash briefing, during which our team of cyber experts will dissect two of the major ransomware attacks that have hit the headlines this month. They will offer a high-level overview and practical advice on how these attacks could have been mitigated – and what your organisation needs to do to avoid suffering the same fate. Our experts will examine:

Read more

CMMC: An Overview and New Developments

Presenter: Preston Bukaty, Consultant, IT Governance USA

According to the U.S. DoD (Department of Defense), the CMMC (Cybersecurity Maturity Model Certification) is “a unified cybersecurity standard for future DoD acquisitions.” The CMMC will serve as a tiered certification scheme to help the DoD assess cybersecurity readiness when seeking suppliers and subcontractors. 

The CMMC reviews and combines various cybersecurity standards and best practices to help contractors map controls and processes across five maturity levels that range from basic cyber hygiene to advanced. Join Preston Bukaty in this webinar where he will give an overview of the CMMC and discuss any exciting developments around this new cybersecurity standard.

In this webinar, Preston Bukaty will cover the following topics: 

  • An overview of the CMMC
  • Audit and assessment – the certification process outlined
  • How the CMMC differs from other cybersecurity standards
  • Which contractors and subcontractors need to comply
  • Future requirements – how to prepare now

Cybersecurity Issues with Teleconferencing Tools

The COVID-19 pandemic has led to an unprecedented number of people working from home, and a surge in the use of tools such as Zoom, Signal, and Microsoft Teams to help employees communicate.  

Assessing whether these tools are secure has become a top priority. 

Zoom in particular has come under fire for not implementing privacy by design, thereby exposing users and organizations to a significant number of threats.  

In this webinar, our cybersecurity expert William Gamble discusses the legal requirements around electronic communication, and the vulnerabilities and threats that these teleconferencing tools expose organizations to. The webinar covers: 

  • Conferencing tools and their security configurations
  • HIPAA (Health Insurance Portability and Accountability Act) requirements for risk assessments
  • Other statutory considerations including the CCPA (California Consumer Privacy Act), the BIPA (Biometric Information Privacy Act), and other U.S. cybersecurity or privacy laws

CMMC: Cybersecurity Certification for US Government Contractors

Delivered by Preston Bukaty, GDPR Consultant.

Due to growing concern that DOD subcontractors are not aware of or cannot adequately meet their security obligations for managing sensitive data, the OUSD(A&S) (Office of the Under Secretary of Defense for Acquisition and Sustainment) introduced the CMMC (Cybersecurity Maturity Model Certification) to help contractors demonstrate eligibility to work with the U.S. government.

The CMMC reviews and combines various cybersecurity standards and best practices to help contractors map controls and processes across five maturity levels that range from basic cyber hygiene to advanced.

Join us for this webinar to get insights into:

  • The CMMC draft and measures for safeguarding government information
  • A new certification scheme – an overview of the draft CMMC
  • Five levels – an in-depth review of the practices and processes
  • Audit and assessment – the certification process outlined
  • The key steps to compliance
  • Future requirements – how to prepare now

Adapting to COVID-19 – Cybersecurity considerations

In these unprecedented circumstances, cyber criminals are coming up with new ways to carry out attacks and exploit fears around the uncertainties of COVID-19.

Creating an effective cyber risk strategy to mitigate the risk of cyber crime is the only way to ensure your organization’s survival.

In this webinar, William Gamble discusses:

  • Types and examples of phishing attacks in the current COVID-19 climate
  • Cybersecurity tips for staff working at home
  • Implementing a staff security awareness program
  • Key measures to reduce risks and prevent cyber attacks

Online panel discussion – COVID-19 Cyber Risk and Data Privacy Response

The sudden global shift to remote working has brought unprecedented changes to social and work habits, and introduced new cyber risks and data privacy challenges that affect the way organizations need to operate.

As most employees are working from home, they may be accessing and processing information outside the organization’s normal security perimeter, which increases the risk of a data breach. With cyber criminals employing sophisticated phishing tactics and malicious websites to target staff by impersonating credible information sources around COVID-19, organizations need to implement security measures to address these challenges.

Read more

This website uses cookies. View our cookie policy