Discover Security Events in Grc
Receive industry alerts, sponsorship, speaking opportunities, ticket discounts and a lot more!
All security events are automatically streamed into this table on a daily basis.
12 hours ago
GRC teams are under growing pressure as regulatory demands and operational complexity increase in 2026. This webinar explores key findings from the second annual State of Continuous Controls Monitoring Report, based on insights from more than 250 InfoSec leaders. Federal and commercial Solution Advisors will discuss common technical pain points and industry challenges, including the number of frameworks organizations manage and shifts in the regulatory landscape.
The session also examines AI adoption in GRC, levels of human oversight, resource constraints affecting key activities, and reported ROI among adopters. Attendees will receive a four step roadmap for implementing GRC automation and guidance on features to prioritize in a modern GRC platform.
12 hours ago
This session focuses on how privacy teams are adapting to growing regulatory pressure and increasing enforcement by working more efficiently with modern tools. TrustArc’s Chief Privacy Officer and Edgewell’s Global Data Protection Officer discuss how organizations are managing evolving global privacy requirements, including those tied to AI, while reducing operational strain on their teams.
The conversation highlights how TrustArc’s Arc platform supports faster regulatory research, simplifies vendor onboarding and system management, and reduces duplication across compliance efforts. Attendees will see how privacy programs can streamline assessments and audits while maintaining stronger oversight. The webinar is designed for privacy and compliance leaders looking to improve scalability, efficiency and control in their data protection programs.
11 hours from now
Security strategies for 2026 require equal focus on people and technology, and this webinar shows how MSPs can bring both together into one practical defense model. The session centers on the growing role of human risk alongside technical threats and explains why modern attackers target behavior, awareness, and processes as much as infrastructure.
The discussion covers the key security challenges MSPs are expected to face in 2026 and shares clear, actionable steps to strengthen both human and technical controls. Attendees will gain insight into building a balanced security approach that protects users, reduces risk, and helps MSPs position security as a business advantage for their customers.
11 hours from now
Heightened military tensions involving Iran are placing increased pressure on sanctions compliance across cryptoasset and financial services sectors. This webinar examines recent intelligence, including a reported surge in outflows from the Iranian exchange Nobitex following initial airstrikes. Speakers Tom Robinson, Chief Scientist at Elliptic, and David Carlisle, VP of Policy and Regulatory Affairs, will outline what these developments signal for compliance programs.
The session covers Iran linked cryptoasset activity, sanctions evasion patterns, and the regulatory impact on firms operating in digital assets and financial services. Attendees will also gain practical guidance on assessing exposure, configuring screening controls, and responding to rapidly evolving sanctions risks.
11 hours from now
AI agents are rapidly being adopted across organizations, creating new security risks that demand immediate attention. This webinar focuses on building a practical strategy to manage AI agents throughout their lifecycle, from initial deployment to ongoing oversight. It outlines a modern security framework that combines governance, policy enforcement and threat detection to maintain visibility and control.
The session also addresses how security, IT and business teams can work together to manage AI related risks more effectively. Attendees will gain guidance on monitoring agent behavior, responding to emerging threats and clearly communicating AI security priorities to executive leadership. The discussion is designed to help organizations regain control before unmanaged AI agents introduce serious exposure.
11 hours from now
Autonomous trust operations and the rise of GRC Engineering take center stage in this forward looking session focused on the future of compliance and risk management. As AI and automation reshape security programs, the discussion examines how trust automation and compliance as code are redefining how organizations manage governance, risk and compliance at scale.
The webinar explores how AI is transforming evidence collection, risk identification and remediation, while outlining the organizational models that support a modern GRC Engineering function. Through practical examples, speakers explain how manual and reactive processes are evolving into automated, intelligence driven systems designed for continuous compliance. The session is tailored for technical and strategic leaders seeking to modernize their GRC programs and prepare for a more autonomous approach to trust management.
1 day from now
Cyber compliance is becoming more complex as organizations navigate overlapping regulations, standards, and resilience requirements. This webinar focuses on how a single controls based approach can help enterprises align frameworks such as NIST, DORA, the EU AI Act, and other cyber regulations while strengthening operational resilience and risk management.
The discussion examines why governance and controls sit at the center of modern cyber resilience and how a unified controls model reduces duplication and complexity across frameworks. Speakers will share practical guidance on implementing, testing, and monitoring controls consistently, including areas like ICT risk management, third party risk, and AI governance. The session is designed for teams looking to simplify compliance while improving overall cyber protection across industries.
1 day from now
Strengthening risk culture plays a critical role in cybersecurity by shaping how employees, leaders and teams respond to threats in everyday situations. This webinar explores how organizations can measure risk culture and embed it into daily operations so security is treated as a shared responsibility rather than a compliance task. The discussion highlights how behaviors, decision making and accountability directly influence an organization’s ability to prevent and respond to cyber incidents.
The session examines the impact of blame based environments, shadow IT practices and leadership behavior on overall security posture. It explains how empowering employees to report issues early, aligning business priorities with secure processes and setting the right tone at the executive level can reduce exposure to cyber risk. Attendees will gain practical insight into turning risk culture from a concept into measurable action that strengthens organizational security.
1 day from now
Compromised credentials are involved in most data breaches, and Active Directory remains central to enterprise access. This webinar focuses on securing Active Directory within an evolving Continuous Threat Exposure Management framework, with specific attention to India FSI regulations. It addresses common risks such as misconfigurations, ghost accounts, and excessive permissions that accumulate over time, and highlights the need for real time visibility to meet RBI and SEBI mandates.
The session covers identifying AD weaknesses without agents or high privilege accounts, visualizing attack paths, and automating compliance reporting. Attendees will also receive a remediation checklist for common misconfigurations and a preview of modern attack surfaces spanning identities, cloud assets, and AI workloads.
1 day from now
Managing vulnerabilities across cloud and container environments has become a critical challenge as hybrid and multi cloud infrastructures continue to expand. This webinar focuses on how organizations can extend vulnerability management beyond traditional agent based methods by using cloud native, automated approaches that improve visibility and reduce operational complexity.
Tenable experts explain how cloud vulnerability management provides instant multi cloud visibility across major platforms without deploying agents, how intelligent prioritization helps teams focus on the most critical risks, and how container images can be secured throughout the lifecycle. The session also shows how cloud, on premise, and endpoint exposures can be unified within a single view to support more effective exposure management across the entire attack surface.
1 day from now
Maintaining CMMC compliance after initial certification requires more than a one time assessment. This session focuses on what organizations must do in years two and three to demonstrate continuous compliance, including legal attestations and the risks tied to overstating cybersecurity readiness under the False Claims Act. The discussion emphasizes why ongoing validation is essential for protecting both business operations and national security interests.
Experts from A LIGN and Summit 7 outline how to build a structured continuous compliance plan that reduces risk and strengthens long term defensibility. Attendees will gain insight into the role of C3PAOs and MSPs in interim assessments, the value of credible third party validation and practical steps for sustaining a compliant and audit ready CMMC posture beyond the initial certification milestone.
2 days from now
Maintaining CMMC compliance beyond initial certification requires a structured plan that supports ongoing validation and legal attestation. This session focuses on building a continuous compliance strategy that helps organizations meet requirements in years two and three while reducing exposure to financial and legal risk. The discussion highlights the importance of accurate reporting and the consequences of overstating cybersecurity compliance under federal regulations.
Experts from a leading C3PAO and MSP will outline practical steps for sustaining a defensible compliance posture through interim assessments and the right team support. Attendees will gain insight into strengthening long term CMMC readiness, protecting sensitive information and ensuring continued alignment with national security requirements.