Views Navigation

Event Views Navigation

Today

Role of GRC in Fraud and Breach Prevention for SMBs

As businesses scale to meet rising demands, getting a clear visibility of what is happening in your digital assets is vital. It is important to run continuous monitoring to effectively scan for a broad range of attacks, troubleshoot potential risks and secure your tech stack.

Business Email Compromise and Defense

As businesses scale to meet rising demands, getting a clear visibility of what is happening in your digital assets is vital. It is important to run continuous monitoring to effectively scan for a broad range of attacks, troubleshoot potential risks and secure your tech stack.

How vCISOs Help Optimize Your Cyberdefense

Organizations are facing a dangerous combination of mounting cybersecurity threats and a widening gap in the skills required to identify and combat them. A Virtual CISO can be a less costly solution.

Establishing Customer Trust through Compliance

Trust takes years to build, seconds to break, and forever to repair. Companies around the globe are challenged by increased regulatory requirements and consumer expectations for privacy protection. So, how can you demonstrate security, and build consumer trust through achieving compliance?

Securing Your Business – Starting with Multi-Factor Authentication

With the increased use of devices and tools, organizations are looking for ways to enhance protection of their information and system. Multi-Factor Authentication (MFA) is a powerful tool that can protect your business from various cyber threats.

Zero Trust in B2B Environments: What You Need to Know

With the increased use of devices and tools, organizations are looking for ways to enhance protection of their information and system. Multi-Factor Authentication (MFA) is a powerful tool that can protect your business from various cyber threats.

Towards ISO 27001 Certification

Your customers and business partners are asking for an ISO 27001 certification from you - but you are not sure how to go about it? While the value of getting ISO 27001 certified is clear, the path to get there is not.

Information Security for Healthcare and The Impact of AI

As the leading speaker of our imminent cyberhealth training on October 17th, Fred Boissiere will shed light on the dynamics of the ever-changing landscape of cyberattacks. Fred will also dive into the complexities of cybersecurity and data privacy, best practices and the shifting healthcare landscape, beyond the realm of AI.

A Deep Dive into Our Refreshed SOC 2 Certification

Kobalt.io has recently refreshed our SOC 2 Type II certification, demonstrating our commitment to continuously enhance our security measures to safeguard your digital assets. In this webinar, we'll share with you our journey to compliance achieving SOC 2 compliance.

Reducing the Pain of Compliance Audits

In this webinar, Kobalt.io and Prescient Assurance will guide you through the intricate landscape of ensuring organizational security and regulatory adherence.

Combatting Business Email Fraud

Email remains one of the biggest attack vectors, making email security ever more crucial for organizations today. Join Kobalt.io and RBC to learn how to detect, prevent, and respond to various forms of email fraud effectively.