Skip to content

Third-party Vendor Risk Assessments

Virtual

While outsourcing to third party vendors has great benefits including cost efficiency, time-to-market, and scalability, it can introduce additional risks to the information if data isn’t properly managed. Vendor exposure is considered as one of the key vulnerabilities in organizations’ risk assessment. Several organizations are leveraging third-party risk assessment methodologies for reviewing their vendors’ risks […]

Free

Cybersecurity & Data Protection in the Middle-East

Virtual

Cybersecurity is regarded as one of the most significant risks to which firms in the Middle East are exposed. More specifically, in Saudi Arabia, Cybersecurity is considered a serious concern due to the country’s massive use of modern technology across businesses. The Saudi Arabian Monetary Authority (SAMA), the country’s central bank, created the SAMA-Cyber Security […]

Cloud Security Best Practices

Virtual

Many organizations are moving their applications and data to the cloud rather than incurring the costs of purchasing hardware and running/maintaining on-premises applications. Likewise, other organizations manage their data in on-premises systems but store their backups in the cloud. Regardless of which approach your organization chooses, you may still have many questions about cloud-based security. […]

Cybersecurity for Healthcare

Virtual

With increased migration to the cloud coupled with rising usage of connected devices, the cyber attack surface has broadened in healthcare organizations. Healthcare data breach costs are highest as per IBM’s Cost of Data Breach Report, 2021. A single vulnerable asset can provide a threat actor access to sensitive patient data and medical services. Join […]

What is CMMC Version 2 (Cybersecurity Maturity Model Certification)

Virtual

Are you interested in working with the Department of Defense (DoD)? In this webinar, our guest speaker – Greg Manson, will discuss the CMMC Version 2 certification which will become a prerequisite to work with the DoD, outline the differences from CMMC Version 1 and share overlaps with the NIST framework, which was being used. […]

Cybersecurity for Radiologists and Allied Businesses

Virtual

Explore the terrain of data breaches in Medical Imaging Technology, DICOM, PACS, VNA, RIS, Telehealth, AI-based imaging technology and Healthcare SaaS. This webinar is designed for professionals working in the field of Radiology and allied businesses. It will highlight the sources of a breach, ways to prevent a data breach and avoid the loss of […]