Skip to main content
Please wait...
17 April

Webinar on OWASP Top 10: Safeguarding Applications Against Common Vulnerabilities

5:00 PM - 6:00 PM IST   -   online

EVENT OVERVIEW:

This webinar will provide an in-depth understanding of the OWASP Top 10, a globally recognized standard for application security risks. Learn about the most common vulnerabilities that threaten web applications, such as Injection, Broken Authentication, and Cross-Site Scripting (XSS). The session will also focus on preventive strategies, best practices and implementation of robust security measures to mitigate these risks. The webinar is designed for security professionals and anyone involved in securing web applications.

 

View Details
20 March

Webinar on Compliance to Competitive Advantage: How Privacy-Enhancing Technologies (PETs) Drive Business Growth

5:00 PM - 6:00 PM IST   -   online

Details

Privacy is not just a compliance necessity but a competitive differentiator. Privacy-Enhancing Technologies (PETs) are tools and techniques designed to protect personal and sensitive data while enabling businesses to leverage data for insights, innovation, and growth. These technologies help organizations comply with privacy regulations, build consumer trust, and facilitate secure data sharing without exposing identifiable information. (PETs) can boost consumer trust, ensure compliance, and unlock new business opportunities.

View Details
20 February

Webinar on IT GRC Compliance Assessment

5:00 PM - 6:00 PM IST   -   online

Details

IT GRC Compliance Assessment focuses on evaluating an organization’s IT governance, risk management, and compliance strategies. It ensures that IT processes align with business objectives while adhering to regulatory requirements and mitigating potential risks. This assessment identifies gaps in compliance, evaluates control effectiveness, and recommends improvements based on frameworks like ISO 27001, NIST, or COBIT. It enables organizations to manage risks proactively, protect sensitive data, and maintain operational efficiency.

View Details
25 January

Webinar on Data Protection in Vendor Relationships

11 AM - 12 PM IST   -   online

Details

In today’s interconnected business environment, managing data protection within vendor relationships is more critical than ever. This webinar will explore key strategies for navigating the complex landscape of vendor contracts. Whether you are a legal, compliance, or IT professional, this session will equip you with knowledge to establish clear and effective data protection obligations with your vendors.

Key Focus Areas:

a. Strategies for managing data protection within vendor contracts.

View Details
14 December

Webinar - Demystifying SOC Compliance

11 AM - 12 PM IST   -   online

Details

System and Organisation Controls (SOC) reports provide the data required to assess the risks connected with outsourced suppliers. These guidelines must be adhered to by service auditors performing SSAE 18 engagements. SOC compliance demonstrates a commitment to protecting data and maintaining operational integrity. By obtaining SOC reports, organizations assure clients and stakeholders that they have effective internal controls, fostering trust and credibility.

View Details
23 November

Webinar - Designing an Effective Third-Party Risk Management Framework for IT Vendor Partnerships

11 AM - 12 PM IST   -   online

Details

This webinar will explore the critical components of designing a robust Third-Party Risk Management (TPRM) framework tailored to managing risks associated with IT vendor partnerships. As organizations increasingly depend on external IT vendors for essential services, effectively managing the risks of these third-party relationships is paramount to ensuring business continuity, security, regulatory compliance, and data security.

View Details
08 November

Webinar - SOC Introduction and Integration with COSO Framework

11 AM - 12 PM IST   -   online

Details

A SOC report evaluates internal controls for an outsource service provider. Various standards and frameworks define these controls. SOC audits are related to audits that evaluate an organization's controls over its systems, particularly in areas like data security, availability, processing integrity, confidentiality, and privacy. They serve as a standard for providing assurance to customers, stakeholders, and other interested parties about the effectiveness of an organization's internal controls. 

View Details
11 October

Webinar on Building a Culture of Data Privacy

11 AM - 12 PM IST   -   online

EVENT OVERVIEW:

View Details
28 September

Webinar on Regulatory Compliance and Risk Management

11 AM - 12 PM IST   -   online

Overview-

Regulatory compliance and risk management are very critical functions in highly regulated industries such as finance, healthcare and pharmaceuticals which ensure that companies adhere to laws, regulations and specifications relevant to their business and processes while minimizing risks that could potentially harm the organization's reputation, operations and financial standing:

View Details
13 September

Webinar on Preparing for DPDPA with DBoM

5:00 PM - 6:00 PM IST   -   Online

EVENT OVERVIEW:

View Details