Archived Webinars 

Archived Webinars Will Be Available for One Year

  Return to Webinar page

Session Title

Session Date

Getting Back to Basics—The Fundamentals of Cyber Hygiene
8 October 2019
Introduction to Risk Management
2 October 2019
Bulletproof Proxies—How Large-Scale Attacks Hide in Plain Sight
24 September 2019
COBIT 2019—Highly Relevant for Auditors
19 September 2019
Radio Realities—WiFi & Physical Access Technique
18 September 2019
It's a Compliance World—New Standards for Global Privacy Requirements and Regulations
12 September 2019
Become a Next-Gen CISO with Cybersecurity Program Management Automation
10 September 2019
Agentless EDR for Unmanaged and IoT Devices
27 August 2019
How to Start Your Job Hunt
22 August 2019
Career is a Journey—Empowering Success While Ensuring Happiness
21 August 2019
The Insider’s Motive—Defending Against the 7 Most Common Insider Threats
30 July 2019
A Holistic Approach to Cybersecurity Program Management
27 June 2019
The Secret to Secrets Management
25 June 2019
Blazing a Path to the C-Suite with the CIO of Chicago
19 June 2019
DNS as a Foundational Security Architecture for Digital Transformations
21 May 2019
Managing the Insider Threat—Why Visibility Is Critical
2 May 2019
Threat Hunting—A Practical Demonstration, Part 2
30 April 2019
Improve Security, Privacy and Compliance with Continuous Oversight
23 April 2019
Closing the Gap—Negotiating Your Next Raise or Job Offer - Part 2
18 April 2019
Zero Trust in Practice—Why Identity Drives an Adaptive Workforce
11 April 2019
Closing the Gap—Negotiating Your Next Raise or Job Offer - Part 1
10 April 2019
Secure Mobile, Wired & Wireless Networking in the Public Sector
9 April 2019
NIST’s Risk Management Framework V2—Changes, Challenges and What You Can Do Now
4 April 2019
IT Security – End User Practical Guidance
28 March 2019
Threat Hunting—A Practical Demonstration
26 March 2019
What's Your DNS Security Risk? Insights from Recent Ponemon Survey
12 March 2019
Understanding Security, Audit and Compliance in a Complex Environment
7 March 2019
Dissection of the Threats in Technology Trends. Forever?
28 February 2019
Don’t Get Jacked—4 Steps to Protecting Your XaaS in the Cloud
21 February 2019
The CISO of the Future
20 February 2019
Why Go Phishing? Build Your Business Case for Phishing Awareness
12 February 2019
Enforcing Data Privacy in the Digital World
7 February 2019
How to Create a Sustainable Vendor Risk Management Program
30 January 2019
The New Cat and Mouse Game—AI and Malware
24 January 2019
ERP Under Attack - Fighting Back Against Breaches
18 December 2018
Cybersecurity—Strategies for Successful Business Engagement
4 December 2018
Introducing COBIT 2019
15 November 2018
Latest Business Email Compromise Scams - Don't Be the Next Victim
13 November 2018
Understanding the Threat Landscape
13 November 2018
How to Fight Security Fatigue in Your Enterprise
6 November 2018
Machine Learning: What Assurance Professionals Need to Know
1 November 2018
Delivering Efficient Ongoing Assurance of Your GDPR Program
25 October 2018
Aligning VRM with Organisational Resilience: How to Solve Dependency of Vendors in the Connected World
24 October 2018
Phishing: How to Protect from Today's #1 Threat
10 October 2018

If you have other questions or comments regarding any of the above webinars, please visit