Discover Security Events in Grc
Receive industry alerts, sponsorship, speaking opportunities, ticket discounts and a lot more!
Governance, Risk, and Compliance has transformed from administrative overhead into a strategic business function that enables organizations to navigate complex regulatory environments, manage cyber risks systematically, and align security investments with business objectives. The integration of GRC frameworks with operational security programs has become essential for demonstrating accountability and maintaining stakeholder trust.
Organizations face an increasingly complex web of overlapping regulations including GDPR, CCPA, SOX, HIPAA, PCI DSS, and industry-specific requirements. The proliferation of data privacy laws, cybersecurity disclosure mandates, and sector-specific frameworks creates compliance challenges requiring continuous monitoring, attestation, and reporting. Board-level oversight of cyber risk has intensified following high-profile breaches and regulatory enforcement actions, elevating GRC to executive priority status.
Modern GRC platforms provide integrated capabilities for policy management, risk assessment, control testing, compliance monitoring, and audit management. These solutions automate evidence collection, facilitate cross-functional collaboration, and provide dashboards that translate technical security metrics into business risk language. The relationship between GRC and Identity and Access Management is particularly critical, as IAM serves as a foundational control supporting governance policies and compliance requirements (forrester.com).
Organizations are adopting risk-based GRC methodologies that prioritize resources based on threat likelihood and business impact rather than attempting comprehensive compliance. Integration of threat intelligence, vulnerability data, and business context enables more informed risk decisions. Challenges remain in quantifying cyber risk, demonstrating return on security investment, and maintaining GRC programs that keep pace with rapid technological and regulatory changes.
All security events are automatically streamed into this table on a daily basis.
9th December 2025 | 2026 Identity Security Forecast: 5 Trends You Can’t Afford to Miss
The 2026 Identity Security Forecast: 5 Trends You Can’t Afford to Miss webinar provided insightful analysis on emerging identity security trends. Experts discussed advancements in AI-driven authentication, zero-trust frameworks, and the growing importance of decentralized identity solutions. Attendees appreciated the practical strategies for enhancing security posture and the engaging Q&A session. The event successfully highlighted critical developments, equipping participants with knowledge to navigate the evolving cybersecurity landscape effectively. Overall, it was an informative and valuable experience.
Online • Part of ManageEngine
18th December 2025 | Simplifying everyday Active Directory operations.
The "Simplifying Everyday Active Directory Operations" webinar provided valuable insights into streamlining Active Directory management. Attendees appreciated the expert-led sessions that covered automation techniques, best practices, and troubleshooting tips. The event was well-organized, with clear presentations and interactive Q&A sessions. Participants found the practical demonstrations particularly useful for real-world application. Overall, the webinar was highly informative, equipping IT professionals with tools to enhance efficiency in Active Directory operations.
Online • Part of ManageEngine
3rd December 2025 | AI Security in 2025: What We Learned and What’s Coming in 2026
2025 pushed AI security from theory to everyday reality. Teams saw sharper defenses, faster detection, and new automation but also a wave of AI-driven attacks that raised fresh questions about risk, governance, and the limits of relying on machines.
This session brings leaders from Prescient Security and Alvaka together to break down what actually happened this year and what security teams should expect in 2026.
In 45 minutes, you’ll get a clear view of the biggest shifts in AI-powered defenses, how attackers adapted, where automation helped (and where it didn’t), and the trends already shaping next year.
We’ll cover advancements in detection, red teaming, Zero Trust, threat intelligence, and deep learning; the challenges around privacy, misuse, and over-reliance; and the emerging focus on agentic AI, hyper-automation, explainability, and governance.
If you want a practical, no-fluff look at how AI changed security in 2025 and what’s around the corner, this session is for you
Company_Webinar • Part of Prescient Security
2nd December 2025 | How to Grow without Overspending: Lessons to learn for Growing Businesses
The event "How to Grow without Overspending: Lessons to Learn for Growing Businesses" offers valuable insights for businesses aiming to expand efficiently. Attendees praised the expert speakers for their practical advice on cost-effective growth strategies. The conference provided actionable tips on optimizing resources, leveraging technology, and minimizing expenses. Networking opportunities were abundant, allowing participants to connect with industry leaders. Overall, it was a well-organized event that delivered on its promise to educate and inspire.
Online • Part of ManageEngine
25th November 2025 | Insider Threats Unmasked: Using Identity to Thwart Inside Attacks
The "Insider Threats Unmasked: Using Identity to Thwart Inside Attacks" event provided valuable insights into combating insider threats through identity management. Experts shared strategies for identifying and mitigating risks posed by internal actors. Attendees appreciated the practical case studies and interactive sessions, which enhanced their understanding of implementing robust security measures. The event successfully highlighted the importance of identity in safeguarding organizations, making it a must-attend for cybersecurity professionals seeking to strengthen their defenses.
Company_Webinar • Part of ManageEngine