Protecting High-Profile Individuals in...
High-profile individuals—across both public and private sectors—face escalating digital risks that can quickly evolve into physical threats. Doxing, targeting, harassment and metadata-driven reconnaissance have lowered the barrier for adversaries to act, making Digital Signature Management (DSM) a critical pillar of modern force protection. During this webinar, attendees will learn: How digital signatures are collected, exploited a...
Future-Proofing Flood Modeling: Meeting...
Flooding is no longer a rare event; it is an increasing reality for communities across the country. New federal standards updated floodplain maps, and resilience-focused mandates are reshaping how sewer and drainage systems must be designed. Infrastructure built on outdated assumptions risks being undersized, leaving critical services, property, and public safety exposed. Join us for a complimentary webinar where we will examine how modern flo...
Cyber and Tech in Focus: Strengthening...
Join the EY Center for Board Matters on Wednesday, November 5, 2025, for another episode in our webcast series, Better Questions for Boards, designed to provide directors with insights and questions to consider as they engage with management on a variety of complex boardroom issues. This webcast will unpack the latest developments in cybersecurity with insights from a CISO, a former CTO and chief AI officer, and an FBI official. The discussion...
November 5, 2025
Organizer:
EY Location:
Webcast
Smarter Legal Spend: How to Reimagine M...
Corporate demand for legal services is increasing, yet legal leadership often must manage greater global complexity, drive innovation and demonstrate increased value on a flat or lower budget. Join leaders from Altria Group, Inc., Wells Fargo & Company, Ernst & Young LLP and Onit, Inc. for an interactive discussion on how leading organizations are transforming outside counsel management and redefining legal spend efficiency as agentic...
September 17, 2025
Organizer:
EY Location:
Webcast
Stopping Credential-Based Attacks and L...
Phishing-resistant access is now a mandate, not a nice-to-have. But most federal authentication workflows still rely on passwords or other shared secrets that attackers can easily exploit. These compromises often become the entry point for lateral movement inside networks, escalating the impact of a breach. Join this webinar to learn how Beyond Identity helps agencies strengthen both device and identity assurance without introducing user frict...
Stopping Credential-Based Attacks and L...
Phishing-resistant access is now a mandate, not a nice-to-have. But most federal authentication workflows still rely on passwords or other shared secrets that attackers can easily exploit. These compromises often become the entry point for lateral movement inside networks, escalating the impact of a breach. Join this webinar to learn how Beyond Identity helps agencies strengthen both device and identity assurance without introducing user frict...
The Impact of AI on Finance, Internal A...
Join the EY Center for Board Matters on Tuesday, July 15, 2025, at 3:00 p.m. (ET) for another episode in our webcast series, Better Questions for Boards, designed to provide directors with insights and questions to consider as they engage with management on a variety of complex boardroom issues. AI technologies are surging and evolving, presenting both risks and opportunities for companies. Boards and particularly audit committees are keenly f...
July 15, 2025
Organizer:
EY Location:
Webcast
BeyondTrust's Securing Paths to Privile...
Registration is Closed Join BeyondTrust and your peers for a Lunch and Learn on June 12 from 12:30-2:30pm ET at Jackson's Bistro in Tampa, Florida. In this two-hour session, we’ll explore what it means to go beyond traditional privilege access management (PAM) to find, control, and protect hidden paths to privilege, minimizing your identity attack surface and overall impact if an attack does occur. Topics we’ll cover:What modern id...
BeyondTrust's Securing Paths to Privile...
Join BeyondTrust and your peers for a Lunch and Learn on June 10 from 12:30-2:30pm ET at the Ruth's Chris Steak House in Boston, MA. In this two-hour session, we’ll explore what it means to go beyond traditional privilege access management (PAM) to find, control, and protect hidden paths to privilege, minimizing your identity attack surface and overall impact if an attack does occur. Topics we’ll cover:What modern identity security...
Beyond the Administration’s First 100 D...
Join our panelists as they discuss how leading financial services companies can effectively navigate the evolving policy landscape and adapt to regulatory and supervisory changes during the second Trump administration. In this webcast, the panelists will discuss:Digital assets/crypto: the implications of the administration's approach to digital assetsGrowth and M&A: market developments and regulators’ initiatives affecting organic gr...
May 7, 2025
Organizer:
EY Location:
Webcast
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.