Discover Security Events in Grc
Receive industry alerts, sponsorship, speaking opportunities, ticket discounts and a lot more!
All security events are automatically streamed into this table on a daily basis.
2 hours from now
Executive Order 14117 is changing how organizations manage cross border data transfers, and this webinar focuses on what those changes mean in practice. The session brings together compliance, legal, and privacy professionals to break down which organizations and data flows are affected, what activities are restricted or prohibited, and how to evaluate vendor relationships under the new requirements.
The discussion centers on real world compliance approaches, including how teams are mapping data flows, identifying risk areas, and addressing challenges as they arise. Attendees will gain practical insights they can apply immediately to strengthen privacy controls, reduce regulatory risk, and align internal processes with the executive order.
2 hours from now
Cyber risk management is entering a new phase as organizations prepare for the challenges of 2026. This webinar focuses on the key Cyber GRC trends shaping how teams identify, manage, and reduce risk in an increasingly complex threat environment. The discussion looks at how AI is influencing cyber risk programs, the growing importance of AI governance, and why traditional approaches are no longer enough.
The session also examines the convergence of IT and OT risk, the need for continuous compliance, and how these shifts affect overall cyber resilience. Attendees will gain a clear view of what is changing in cyber risk management and how organizations can adapt their strategies to stay protected as threats continue to evolve.
2 hours from now
Scaling trust and compliance becomes more complex as organizations grow, especially when tools and workflows are fragmented. This webinar focuses on how security, compliance, risk, and vendor management can be brought together to give leaders clearer visibility into real business risk while staying audit ready.
Through a live product demo, the session shows how teams mature their security and compliance programs, connect daily controls to enterprise risk reporting, and automate trust building across customers and third parties. Attendees will see how high growth companies use a unified approach to reduce manual effort, strengthen governance, and scale securely with confidence.
2 hours from now
This live workshop focuses on managing vendor risk using a simple, structured approach guided by UpGuard cyber risk experts. Participants will follow along in their own workspace while the presenters demonstrate the essential steps needed to assess and manage third party risk effectively within the UpGuard platform.
The session walks through adding a vendor, running both AI driven and traditional risk assessments, and sending questionnaires to gather critical security information. Designed as a hands on workshop, it gives security and risk teams practical exposure to vendor risk workflows and helps them build confidence in applying these processes in real world environments.
2 hours from now
Security awareness becomes far more effective when safe behavior feels automatic rather than forced. This webinar shows how Copart transformed its cybersecurity training program into a habit driven experience that employees actively engage with. Brittany Little and Danielle Chade explain how Copart replaced low engagement awareness efforts with behavior based training that encourages instinctive actions, such as reporting suspicious emails without hesitation.
The session walks through how automation, high volume simulations, gamification, and data driven testing helped Copart scale participation and improve real security outcomes. Attendees will hear how measurable gains in reporting, reaction, and success rates were achieved, and how leadership support helped embed security into everyday work culture. This webinar offers practical guidance for security teams looking to drive lasting behavioral change across their organizations.
2 hours from now
Third party risk programs continue to grow, yet breaches, delays, and visibility gaps remain a persistent problem across industries. This webinar presents key findings from the State of Third Party Risk Assessments 2026 research, revealing where organizations believe their TPRM programs are effective and where performance falls short in practice.
Research leaders from the Ponemon Institute and ProcessUnity walk through benchmark data based on input from more than 1,400 risk and security professionals worldwide. The discussion focuses on assessment timelines, third party and downstream risk exposure, manual effort, and how maturity varies by organization size and industry. Attendees will gain a clear view of how their third party risk approach compares to peers and where targeted improvements can reduce exposure and strengthen overall security.
1 day from now
Security operations teams are overwhelmed by alert volume, false positives, and slow response times that allow real threats to linger. This live demo focuses on automating incident response to close the gap between detection and containment, showing how SOC teams can move from hours to minutes when handling phishing and email based attacks.
The session demonstrates how automated workflows, AI driven analysis, and validated threat intelligence reduce manual effort, cut alert fatigue, and improve accuracy without losing human oversight. Attendees will see how rapid mailbox remediation, visibility into AI decisions, and post incident training workflows improve both security outcomes and SOC efficiency. The webinar is designed for security teams looking to streamline operations, reduce risk exposure, and make incident response faster and more reliable.
1 day from now
See how a no code Information Security Management System can centralize security, risk, and compliance in one platform. This product showcase focuses on how Decision Focus ISMS helps organizations protect assets, manage information security risks, and support a security aware culture through streamlined workflows and clear visibility.
The session covers how the platform supports major security and compliance frameworks such as ISO 27001, NIST, HIPAA, COBIT, and GDPR readiness. Attendees will see how automation, integrated tools, and real time risk visibility reduce manual effort, improve audit readiness, and shift teams from reactive defense to proactive security management.
1 day from now
A focused walkthrough of Decision Focus ISMS, showing how a no code Information Security Management System helps organizations manage risk, protect assets, and meet security compliance requirements. The session highlights how the platform centralizes security controls and supports ongoing risk management.
The presentation also covers how automated workflows simplify compliance activities and help organizations build a consistent, security aware culture. Attendees will see how the system can be used to maintain visibility, accountability, and alignment with information security standards.
2 days from now
AI adoption in cloud environments is reshaping how attackers operate and where risk is building. This webinar examines emerging threat patterns tied to AI usage in the cloud, highlighting how new attack techniques are developing alongside long standing security gaps.
The session focuses on how attacker behavior is evolving as AI becomes more accessible and how these changes are impacting cloud security posture. Attendees will gain clarity on where risk is concentrating and what security teams should be paying attention to as AI driven workloads continue to expand.
6 days from now
Marketing and privacy teams are under growing pressure to work together as regulatory enforcement increases and expectations around consent continue to rise. This webinar focuses on how organizations can move beyond basic compliance activities and adopt more unified models that connect consent management, data rights, and trust governance while still supporting personalization and AI driven marketing.
The session covers real challenges teams face when balancing lead generation with privacy obligations and explains how integrated approaches improve data quality, reduce friction, and strengthen first party data foundations. Attendees will gain practical guidance on aligning operating models, governance, and shared metrics, along with insights on where to start, what pitfalls to avoid, and how to scale privacy programs in a way that supports innovation without increasing risk.
6 days from now
Regulatory scrutiny around privacy rights requests is intensifying as volumes grow and requirements become more complex across jurisdictions. This session examines what regulators expect when organizations receive requests to access, delete or manage personal data, especially when that data sits in siloed or unstructured systems. The discussion focuses on how companies can meet legal obligations while navigating fragmented global privacy laws.
Privacy experts share practical approaches to managing the full lifecycle of a request, from intake and identity verification to fulfillment and reporting. The webinar highlights enforcement trends, common operational challenges and proven methods to reduce manual effort while maintaining compliance. Real world lessons from customer experience are included to help privacy and data protection teams improve response times, lower risk and scale their programs with greater confidence.