Past Webinars

On-demand Recording

Missed our live webinars?

Don't worry, you can now watch the replay anywhere anytime, and if you would like to chat about anything cybersecurity-related, contact us!

Description

What is a Data Protection Officer and do you need one? Rewatch our webinar as we discuss what a DPO does and applicable laws.  

Cybersecurity Monitoring - Scaling Your Business with Continuous Data Intelligence

Cybersecurity Monitoring - Scaling Your Business with Continuous Data Intelligence

Role of GRC in Fraud and Breach Prevention for SMBs

Role of GRC in Fraud and Breach Prevention for SMBs

Overcoming Data Privacy and Cybersecurity Challenges

Overcoming Data Privacy and Cybersecurity Challenges

Fortifying Your Security Frontline with Awareness Training

Fortifying Your Security Frontline with Awareness Training

Reducing Cybersecurity Risks with a Developer-first Approach

Reducing Cybersecurity Risks with a Developer-first Approach

What SMBs Need to Know about Bill C-27?

What SMBs Need to Know about Bill C-27?

Going Passwordless: The Future of Cybersecurity

Going Passwordless: The Future of Cybersecurity

Warfare and Digital Identity – The Impact on the Digital Economy

Warfare and Digital Identity – The Impact on the Digital Economy

SOC2 for Startups: Preparation, Timing, Execution, Sustainment

SOC2 for Startups: Preparation, Timing, Execution, Sustainment

Digital Charter Implementation Act: Canada's GDPR?

Digital Charter Implementation Act: Canada's GDPR?

Are you prepared for a breach?

Are you prepared for a breach?

Reduce data breaches: Implement best practice web app security testing

Reduce data breaches: Implement best practice web app security testing

How not-for-profits should tackle cybersecurity

How not-for-profits should tackle cybersecurity

Breaking down Quebec's Bill 64: Private Sector Act

Breaking down Quebec's Bill 64: Private Sector Act

Strategies for Evaluating and Ensuring Code Security and Resiliency

Strategies for Evaluating and Ensuring Code Security and Resiliency

Protecting the Cloud

Protecting the Cloud

The Top Cybersecurity Mistakes Smaller Companies Overlook

The Top Cybersecurity Mistakes Smaller Companies Overlook

Navigating Security Questionnaires, Compliance and Closing the Deal

Navigating Security Questionnaires, Compliance and Closing the Deal

Business Email Compromise and Fraud

Business Email Compromise and Fraud