You must be logged in for webinar completion history
16 of 46 Results
InfoSec program management is too inefficient to support the real-time needs of CISOs as they address the growing complexity of internal and external risks.
When it comes to cybersecurity metrics, there’s a lot of elements to consider.
In partnership with UPCEA, an online and professional education association, ISACA is hosting the webinar, Partnering with ISACA to Grow the University's Continuing and Professional Workforce Development Education Programs.
Will AI (Artificial Intelligence) fundamentally change how we manage risk? What impact will the intersection of risk from cybersecurity and AI have on our profession?
In her mission to close the gender and leadership gaps that exist in the workplace, PepTalkHer founder Meggie Palmer has discovered yet another gap that stands in the way for many people on the path to success: the confidence gap.
Uncover how innovative organizations are utilizing technology to secure their z/OS systems, explore the critical importance of privileged access monitoring and...
Uncover how innovative organizations are utilizing technology to secure their z/OS systems, explore the critical importance of privileged access monitoring and learn how to effectively manage user access through an External Security Manager (ESM).
Operating inside of, and with, highly competitive and complex organizations, Ginny Clarke had to develop her own principles to be and remain a strong and effective leader, while
In the age of digital connectivity, information can be replicated, exfiltrated or deleted in a matter of seconds.
In the ever-evolving realm of information security, our prime directive is to shield organizational assets and uphold stakeholder interests. Balancing risk and reward become pivotal as Artificial Intelligence (AI) emerges as a transformative force.
As regulations expand amid today’s dynamic risk environment, including the new SEC ruling on cybersecurity disclosures, organizations struggle to stay in compliance and determine the most cost-effective methods to protect their business from emerging threats.
Gain invaluable insights and strategies to fortify your organization's security posture, ensuring you thrive in the evolving landscape of remote work and global collaboration.
Artificial Intelligence and Machine Learning, Digital Trust, and Smarter Devices are just a few of the technology trends of 2023 as we continue to move along the Digital Transformation spectrum.
ISACA’s mission is to level the global playing field for all members of society and equip them with the skills and credentials to begin or enhance their IT and cybersecurity careers.
The panel discussion with the Chiefs, will discuss some of the most prevalent emerging technologies of 2023 and the impact they had on the business community and will cover predictions from the panel of experts and what technology and potential regulations will emerge or continue to emerge.
With the growing number of privacy laws and regulations, the responsibilities of privacy teams seem to grow year after year.
The insurance industry is evolving fast as it matures with improved risk quantification after years of escalating cyber incidents, increased risk, and unprecedented payouts.
This webinar will provide insider information on working in risk management for tech companies. Topics will include breakdown of risk management teams and scope of work, interview process and preparation and importance of working projects.
With the growing number of privacy laws and regulations, the responsibilities of privacy teams seem to grow year after year. Struggling privacy teams may be able to learn from other enterprises’ privacy programs.
In partnership with UPCEA - an online and professional education association - ISACA is hosting a second webinar panel on how to bridge the divide between academia and the IT industry.
The gap is widening. Your Third-Party Risk Management (TPRM) challenges aren't getting any easier—onboarding still takes too long; you have a backlog of assessment work; and you're not covering as much of your vendor portfolio as you know you should.
En nuestra acelerada era digital de la IA, salvaguardar la información confidencial y preservar la integridad de los datos se ha convertido en una necesidad absoluta para las empresas.
This webinar will discuss the many pain points that CTI teams deal with today and how ServiceNow tackled those problems.
Version 4.0 of PCI DSS was released in March 2022. It marks the first major release in almost 10 years, with changes to structure, terminology, and requirements.
Continuous Threat Exposure Management (CTEM), a category that was designated by Gartner, is trending to be one of the hottest topics in 2023.
Last year, AI broke into the mainstream and business use cases with the advent of generative AI and large language algorithms (LLMs).
By April 2024, the new SEC rules will have been in place for a few months. It will be a good time to see how the SEC rules have impacted organizations.
Losses attributed directly to business email compromise (BEC) surpassed $50B since 2013. Impostors leverage various tactics to hijack your trusted business communications with your customers and business partners...
With this CSF 2.0 update, now is the time to dig in and assess where your cybersecurity program stands today.
The average organization spends 301 hours, or 37 work days, gathering data for every audit.
Through its peer recognition program, ISACA seeks to honor the accomplishments of members and professionals (non-members) globally and inspire new achievements in digital trust.
In today's interconnected world, cybersecurity threats have reached unprecedented levels, necessitating a collaborative approach between General Counsels/Chief Legal Officers (CLOs) and Chief Information Security Officers (CISOs).
AI is revolutionizing business landscapes, but how can organizations harness its full potential?
As the use of AI increases and becomes more important, it will come under more audit scrutiny.
As complexity increases and cyber attacks become more sophisticated, building cyber resilience is becoming top-of-mind for IT and security leaders.
Digital trust is an essential element of digital transformation, and it can build trust with customers and lead to a competitive advantage.
Schools are beginning to realize that across the institution colleges, there is need to integrate IT and Cybersecurity domain areas within their respective programs.
AI's integration into organizations is reshaping the threat landscape, presenting both opportunities and challenges.
Every week we see news stories about emerging threat actors, campaigns, and techniques targeting by industry, sector, and organization type.
Join our webinar exploring AI's transformative impact on cybersecurity in Infosec, cloud security, GRC, and SOCs.
The tenth annual state of cybersecurity global study looks at topics such as cybersecurity staffing, cyber insurance, and the threat landscape.
Discussing today’s challenges with data loss prevention, insider threats, and debunking popular myths.
We live in a world that’s obsessed with talent and intelligence. But the true measure of potential isn’t where you start—it’s how far you can travel.
There are numerous regulatory requirements about consent for data processing, and more and more consumers want to have control over their data.
Too often, organizations rely on their operational or disaster recovery plans to respond to a cyber-attack.