Past Webinars

On-demand Recording

Missed our live webinars?

Don't worry, you can now watch the replay anywhere anytime, and if you would like to chat about anything cybersecurity-related, contact us!

Description

Scammers are increasingly targeting companies’ new employees and using LinkedIn to gather information. Rewatch now.

 

If there is any topic you'd like us to feature, let us know! ​​

Panel: Attack and Defense in the Era of AI

Panel: Attack and Defense in the Era of AI

Cybersecurity for Healthcare

Cybersecurity for Healthcare

Combatting Business Email Fraud

Combatting Business Email Fraud

 Reducing the Pain of Compliance Audits

Reducing the Pain of Compliance Audits

A Deep Dive into Our Refreshed SOC 2 Certification

A Deep Dive into Our Refreshed SOC 2 Certification

Towards ISO 27001 Certification

Towards ISO 27001 Certification

Zero Trust in B2B Environments: What You Need to Know

Zero Trust in B2B Environments: What You Need to Know

Securing Your Business – Starting with Multi-Factor Authentication

Securing Your Business – Starting with Multi-Factor Authentication

Establishing Customer Trust through Compliance

Establishing Customer Trust through Compliance

How vCISOs Help Optimize Your Cyber Defense

How vCISOs Help Optimize Your Cyber Defense

Business Email Compromise and Defense

Business Email Compromise and Defense

Cybersecurity Monitoring - Scaling Your Business with Continuous Data Intelligence

Cybersecurity Monitoring - Scaling Your Business with Continuous Data Intelligence

Role of GRC in Fraud and Breach Prevention for SMBs

Role of GRC in Fraud and Breach Prevention for SMBs

Overcoming Data Privacy and Cybersecurity Challenges

Overcoming Data Privacy and Cybersecurity Challenges

Fortifying Your Security Frontline with Awareness Training

Fortifying Your Security Frontline with Awareness Training

Reducing Cybersecurity Risks with a Developer-first Approach

Reducing Cybersecurity Risks with a Developer-first Approach

What SMBs Need to Know about Bill C-27?

What SMBs Need to Know about Bill C-27?

Going Passwordless: The Future of Cybersecurity

Going Passwordless: The Future of Cybersecurity

Warfare and Digital Identity – The Impact on the Digital Economy

Warfare and Digital Identity – The Impact on the Digital Economy

SOC2 for Startups: Preparation, Timing, Execution, Sustainment

SOC2 for Startups: Preparation, Timing, Execution, Sustainment

Digital Charter Implementation Act: Canada's GDPR?

Digital Charter Implementation Act: Canada's GDPR?

Are you prepared for a breach?

Are you prepared for a breach?

Reduce data breaches: Implement best practice web app security testing

Reduce data breaches: Implement best practice web app security testing

How not-for-profits should tackle cybersecurity

How not-for-profits should tackle cybersecurity

Breaking down Quebec's Bill 64: Private Sector Act

Breaking down Quebec's Bill 64: Private Sector Act

Strategies for Evaluating and Ensuring Code Security and Resiliency

Strategies for Evaluating and Ensuring Code Security and Resiliency

How to Create a Cyber Resilient Business

How to Create a Cyber Resilient Business

Protecting the Cloud

Protecting the Cloud

The Top Cybersecurity Mistakes Smaller Companies Overlook

The Top Cybersecurity Mistakes Smaller Companies Overlook

Navigating Security Questionnaires, Compliance and Closing the Deal

Navigating Security Questionnaires, Compliance and Closing the Deal

Business Email Compromise and Fraud

Business Email Compromise and Fraud