16 Steps in the ISO 27001 Implementation and common implementation pitfalls 1 CPE
Self enrolment
Safe Harbour changes in EU Personal Data Regulations 1 CPE
This presentation discusses why users choose to not update their software, and what can be done about it 1 CPE
Expert insights on 5 Top Trends in Information Governance 1 CPE
Discusses ways to develop a technology GRC framework and use automation to facilitate the new functions. 1 CPE
Knowing how to assess and manage those cyber risks is essential for success. 1 CPE
The Top Five Best Practices for Controlling Third-Party Vendor Risks. 1 CPE

Closing Network Backdoors Webcast

Course rating: No ratings given.
No ratings given.
Category: Webinar
Webinar that will help you refine your security intelligence strategy. 1 CPE
Self enrolment