Discover Security Events in Grc
Receive industry alerts, sponsorship, speaking opportunities, ticket discounts and a lot more!
All security events are automatically streamed into this table on a daily basis.
3 days from now
Building a stronger human firewall through security awareness and compliance alignment is the focus of this session, led by experts from usecure and CyberCert. The discussion centers on how SMB1001 requirements emphasize employee training as a critical part of cybersecurity and how organizations can move beyond basic compliance toward real world resilience. Attendees will see how structured awareness programs support different certification tiers and strengthen overall security posture.
The webinar also explores practical approaches such as automated phishing simulations, microlearning and user risk scoring to measure and reduce human risk. Speakers will explain how a Human Risk Management strategy supports audit readiness while driving meaningful cultural change. A live Q and A will give participants the opportunity to address specific compliance and training challenges.
4 days from now
Financial institutions are rapidly exploring how autonomous AI agents can transform the fight against financial crime. This webinar examines how these agents move beyond basic prompt driven tools to support real time detection, investigation and decision making across fraud and anti money laundering programs. The discussion focuses on how AI can adapt to evolving criminal tactics while maintaining oversight and control in regulated environments.
Speakers will address the operational and governance challenges of deploying autonomous agents, including risk management, transparency and integration with existing compliance workflows. Attendees will gain insight into preparing for the 2026 financial crime landscape, strengthening detection capabilities and responsibly scaling AI driven automation within financial services.
5 days from now
Data privacy requirements continue to evolve as regulatory expectations increase. This live online product showcase demonstrates how privacy management can be handled clearly and centrally. The session highlights how organizations can bring key privacy activities together in one place to reduce manual effort and strengthen oversight.
Attendees will see how core tasks such as RoPA, DPIAs, DSRs, and breach management are managed centrally. The webinar also covers real time privacy risk assessment, automation that keeps processes aligned, and live dashboards designed to provide clear, board ready visibility into data protection activities.
1 day ago
Mature AppSec teams often rely on Burp Suite Professional as their system of record for web security testing. When generic DAST platforms are added, workflows split between practitioner led testing and dashboard driven scanning with different engines, issue models, and evidence. This disconnect can create friction, duplicated effort, and reduced confidence in results.
This webinar examines why traditional DAST models struggle in practice and the hidden costs of disconnected testing ecosystems. Speakers will share real world examples and practical guidance on scaling coverage through practitioner aligned automation. The session also outlines a model where manual and automated testing work together while keeping results reliable and defensible.
1 day ago
Security teams are facing increasing complexity across business units, frameworks, vendor ecosystems, and rapid AI change. This webinar brings together Jadee Hanson, CISO at Vanta, Alex Stamos, former CISO at SentinelOne and CPO at Corridor, and Andrew Becherer, CISO at Sublime Security, for a candid discussion on staying in control without restarting every audit cycle.
The session includes live demos focused on three core areas: Enterprise Control to scale security programs, a context aware AI agent to highlight key risks and automate tasks, and Privacy Automation that integrates ROPA, inventory management, and DPIAs into daily workflows.
1 day ago
Third party risk continues to be a major security concern as organizations rely more heavily on external vendors and partners. This roundtable brings UpGuard customers together for an open discussion on how teams are managing third party risk in real world environments and where common approaches fall short.
The session centers on shared experiences, practical challenges, and effective methods for assessing, monitoring, and reducing vendor risk. Attendees will hear how peers are addressing visibility gaps, prioritizing risks, and improving third party security programs through collaborative discussion.
1 day ago
As organizations scale the use of AI systems, security risks are shifting from traditional data breaches to the misuse of sensitive data within AI workflows. Models may be trained on data they were not intended to access, while non human identities and autonomous agents gain increasing levels of system access. This webinar examines the emerging AI security risks expected to shape enterprise environments in 2026.
The session explores how sensitive data used in AI training can create long term security and governance challenges. Speakers will also discuss the rapid growth of non human identities as a risk surface and the role of AI Security Posture Management in managing these environments. Attendees will gain a practical framework for governing how AI systems access and use data, helping security teams move toward proactive prevention of AI driven misuse.
1 day ago
Governance, risk, and compliance programs often provide visibility into security and compliance gaps, but many organizations still struggle to translate that insight into completed work. This webinar examines the shift from dashboard driven compliance tracking to execution focused GRC programs supported by AI powered automation. Speakers will discuss how organizations can address operational bottlenecks while maintaining oversight and accountability.
The session explains four levels of GRC automation and explores the difference between AI tools that generate drafts and systems designed to execute tasks. It also reviews approval based workflows that maintain auditability and human oversight when using automation. Attendees will gain practical guidance on implementing agent driven approaches to GRC, whether through dedicated platforms or internal solutions, to reduce manual compliance work and improve operational execution.
1 day ago
Sometimes unlikely pairing can be the perfect match: Continuous PTaaS and AI‑driven EASM to reduce external attack surface and strengthen risk protection. Attack surfaces are expanding faster than most security programs can track. Cloud assets, shadow IT, third-party exposure, and externally facing services are constantly changing, yet penetration testing and external visibility often remain siloed.
In this technical webinar, we explore how two seemingly separate disciplines; Penetration Testing as a Service (PTaaS) and External Attack Surface Management (EASM) can work together to create stronger, measurable digital risk protection.
What You’ll Learn
2 days ago
Security and compliance providers face increasing pressure to stand out in a crowded market filled with similar tools and rigid platforms. This webinar introduces Apptega’s spring product launch, focused on helping MSPs and MSSPs strengthen their security, risk, and compliance services. It highlights how the right foundational components, supported by automation and new AI capabilities, can improve service delivery and client outcomes.
Attendees will see new product innovations designed to expand what can be achieved within the platform. The session also shares partner experiences and practical ways to differentiate services, increase revenue potential, and improve client retention through stronger security and compliance offerings.
2 days ago
Post deadline DORA compliance and supply chain resilience take center stage in this session, examining what regulatory alignment looks like in real operational terms. The discussion focuses on how organizations are interpreting requirements around ICT risk management, incident reporting, threat assessment and third party oversight, especially as enforcement approaches vary across Europe and additional regulations such as CSA2 emerge.
Drawing on research and real world cyber risk data, the webinar explores how firms are strengthening supply chain resilience and validating maturity beyond written policies. Speakers will address how regulators may assess cyber readiness, where organizations are concentrating investment and how threat intelligence and measurable data support defensible, regulator ready decision making in an increasingly regulated environment.
2 days ago
Retail environments rely on highly distributed systems that connect stores, e commerce platforms, vendors, and customer facing services. This complexity can create visibility gaps where small security weaknesses develop into significant exposure incidents. This webinar examines how exposure builds within retail infrastructure and how interconnected systems can accelerate the impact of security weaknesses.
The session walks through two real world retail exposure incidents, including a large scale e commerce checkout compromise caused by patch delays and an exploitation of a managed file transfer system that expanded through third party relationships. Speakers will highlight common patterns across these scenarios and discuss how connectivity, fragmented ownership, and delayed remediation contribute to risk. Attendees will gain insights for improving exposure management and reassessing risk when active exploitation increases.