The Role of Deterrence of Insider Risk...
This webinar (1 of a 3-part series) will focus on deterrence, a continuous function, and critical component of a successful Insider Risk Program. Our panelists will discuss the challenges and effectiveness of the “5 Cs” of an Insider Risk Program: Communication, culture, character, compliance, and consequences.
May 21, 2024
Organizer:
ATARC Location:
Webcast
Mexico Manufacturing & Trade Operations...
Mexico Manufacturing & Trade Operations: A Discussion of the Opportunities and Challenges Arising Under the USMCA Mexico has long been an important node in global manufacturing and supply chain networks. While the rise of China diverted some of the trade and investment that would otherwise have gone to Mexico in the 2001-2017 time period, the passage of the USMCA, considered in conjunction with the ongoing U.S.-China trade war, has had the...
AI Solutions to Close the Risk-Confiden...
While AI is a powerful tool for businesses, it's important to remember: not all AI solutions are created equal. Organizations must carefully evaluate AI options to ensure they align with specific needs and organizational or mission objectives. In this conversational webinar our panel of subject matter experts will discuss the differences between generative and predictive AI and how to apply AI-powered technologies to help solve organizational...
AI Progress 2024: Challenges and Opport...
Artificial intelligence has quickly made it’s way to the top of technology conversations in government and industry. While the technology continues to evolve, how can you best mitigate risks and identify opportunities? Join moderator Justin Doubleday, and government and industry leaders as they discuss AI in government trends, challenges and goals for the future. Learning objectives: Trends of using AI in the government space Considering...
Cyber Assurance in Healthcare: Insights...
Healthcare is under attack, but there are proven ways to obtain cyber assurance to break the ongoing reactive cycle against evolving cyber threats. Learn directly from HITRUST and Clearwater the insights to measurably and materially reduce cyber breaches. We’ll review the analysis from HITRUST’s inaugural TRUST report and the obstacles needed to protect patient care, healthcare businesses, and innovators by breaking down the compli...
May 22, 2024
Organizer:
Clearwater Location:
Webcast
Navigating Regulatory Frameworks for Ex...
In an era where digital transformation is integral to how we do business, the significance of adhering to compliance frameworks and mitigating associated risks cannot be overstated. Organizations face the dual challenge of ensuring they are resilient against threats while also remaining compliant with an evolving landscape of regulatory requirements. Join us for a strategic session that delves into the essentials of the Risk Management Framew...
How To Upgrade Your Cybersecurity Risk...
Everyone looks forward to and loves an upgrade. An upgrade to a suite in a hotel or an upgrade to first class for a flight always makes for a much more enjoyable trip. What would it look like to upgrade your Cybersecurity risk assessment capabilities? As an essential element to support your cybersecurity program, performing cybersecurity risk assessments is critical for organizations of all sizes and sectors. With cyber threats evolving in com...
Wireless Insider Threat
In our ever-connected world, wireless devices have transformed how we communicate. However, despite their ubiquity, wireless devices are still susceptible to insider threats. And with the September 30, 2024 deadline to implement Wireless Intrusion Detections for SCIFs and SAPFs quickly approaching, now is the time to learn how to reduce your risk. Insider threat expert Shawnee Delaney, joined by Bastille CTO Dr. Brett Walkenhorst, will shed li...
Consolidation with CrowdStrike
Evolving cyber threats are making an enterprise-wide impact on organizations, forcing business leaders to make complex decisions about the future of their security program and overall strategy. Many organizations have adopted countless security tools, resulting in a disconnected, disjointed security stack that causes operational distress, burns a hole in their pocket and even puts them at further risk because adversaries thrive in complexity....
The GAO Green Book Compliance Academy
A Practical Approach to A-123 Compliance Programs Join us for a unique, interactive workshop that "walks you through" the latest update of The Green Book which now conforms to the Internal Control Integrated Framework (COSO 2013). This training is focused on the current Standards for Internal Control in the Federal Government as detailed in the Green Book. This 18 hour CPE course provides you with the tools to implement a compliance program th...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.