16 Steps in the ISO 27001 Implementation and common implementation pitfalls
1 CPE
Safe Harbour changes in EU Personal Data Regulations
1 CPE
This presentation discusses why users choose to not update their software, and what can be done about it
1 CPE
Expert insights on 5 Top Trends in Information Governance
1 CPE
Discusses ways to develop a technology GRC framework and use automation to facilitate the new functions.
1 CPE
Knowing how to assess and manage those cyber risks is essential for success.
1 CPE
The Top Five Best Practices for Controlling Third-Party Vendor Risks.
1 CPE
Closing Network Backdoors Webcast
Category: Webinar
Webinar that will help you refine your security intelligence strategy.
1 CPE
Social networks