Discover#AuditTuesday GRC Podcast
#AuditTuesday GRC Podcast
Claim Ownership

#AuditTuesday GRC Podcast

Author: YouAttest

Subscribed: 4Played: 3
Share

Description

Every Tuesday we're sharing valuable content for you with the leading authorities in GRC, Compliance and Identity Security. 

75 Episodes
Reverse
In this dynamic #AuditTuesday webinar, cybersecurity expert Greg Kutzbach, Cybersecurity Expert, will dive into the critical topic of keeping SharePoint secure after recent hacks. He will be joined by Garret Grajek, CEO of YouAttest, to discuss robust identity security strategies. The session will explore real-world threats and actionable solutions to protect your SharePoint environment. Key Discussion Points: - Why SharePoint Matters: Understand the importance of SharePoi...
In this dynamic #AuditTuesday webinar, cyber security expert Alan Sugano, President of ADS Consulting Group, we’ll dive into the escalating threat of AI-powered cyberattacks. He will be joined w/ Garret Grajek, CEO of YouAttest on how robust access governance can protect your business and Shannon Noonan, GRC and Cyber Expert. The session explores real-world tactics like AI-driven credential cracking, deepfake scams, and invisible malware, offering actionable strategies to counter them. Key ...
Tune in for an engaging #AuditTuesday GRC podcast focused on mastering the complexities of PCI DSS 4.0. This live session, hosted by YouAttest, a premier identity governance solution, will feature Truvantis, a leading GRC consulting firm, sharing expert insights to guide you toward confident compliance. In this session, we’ll cover: Key PCI DSS 4.0 Updates: Understand critical changes and how they impact your organization.Streamlined Compliance Strategies: Learn how Truvantis’ expert GRC serv...
Join us for an engaging #AuditTuesday webinar featuring renowned AI governance expert Ashley Robinson, hosted by YouAttest. This session will explore the critical elements of AI governance, addressing the risks, standards/frameworks/guidances, and actionable steps needed for responsible AI adoption. Many organizations overlook the importance of education and governance awareness in AI use—leaving leaders and staff unprepared! This session will highlight the need for practical policies and tra...
Join us for an engaging #AuditTuesday webinar featuring renowned auditor Robert Berry, #ThatAuditGuy, hosted by YouAttest. This session will explore the critical elements of conducting effective t user access reviews for identity security vulnerabilities and meeting compliance regulations SOX, GLBA, HIPAA, PCI-DSS, NYRR 500, CCPR/CCPA. Many organizations fall short by relying on the identity managers to conduct the reviews - without consulting the business and application owners!  ...
#AuditTuesday Presents: The CISO’s Playbook: Strengthening Security with Identity and Supply Chain Governance CISOs need robust strategies to secure their ecosystems and the supply chain and identities that make these supply chains secure - are core to a secure enterprise. Join our #AuditTuesday GRC Podcast, where YouAttest’s Garret Grajek and InvisiRisk experts explore how user access reviews and GRC platforms fortify security across identity and software development lifecycles. What’s on th...
As AI transforms industries, ensuring robust governance, risk, and compliance (GRC) is critical to building secure and ethical AI systems. In this dynamic #AuditTuesday GRC Podcast,welcomes Robert Hilliker, an AI project leader, to explore how GRC integrates into AI development. What’s on the Agenda? Real-World AI Insights: Robert Hilliker shares experiences from his diverse AI projects, highlighting challenges and successes.AI Governance Frameworks: Introduction to NIST AI Risk Management Fr...
With cyber threats escalating and compliance requirements tightening, organizations need flexible, expert-driven solutions to stay secure. Virtual CISOs (v-CISOs) are redefining governance, risk, and compliance (GRC) by delivering strategic expertise without the cost of a full-time CISO. In this exciting edition of the #AuditTuesday GRC Podcast, Jerry Sisson, Founder/CEO of MyTechNetwork, moderates a compelling discussion with Jeff Kushner, a cybersecurity marketing and GRC expert, and Garret...
MSPs – it's time to expand your security service offerings with a critical, high-demand compliance function: User Access Reviews (UARs). In this special edition of the #AuditTuesday GRC Podcast, Garret Grajek, CEO of YouAttest, sits down with Joe Rojas, Co-Founder of Start Grow Manage, to discuss how MSPs can unlock new revenue and compliance value by partnering with YouAttest as their backend Managed Security Service Provider (MSSP) for UARs. What’s on the agenda? - What exactly is a...
As identity risk rises across enterprises, CISOs are being called to lead the charge in governance and access oversight. But are they equipped for the challenge? In this edition of the #AuditTuesday GRC podcast, we sit down with Larry Whiteside Jr., veteran CISO and Co-Founder of Confide—a peer-based leadership network for cybersecurity executives—for a frank discussion on how identity fits into modern risk strategy. Larry also brings his perspective as Co-Founder of the ICMCP, focused on adv...
As artificial intelligence reshapes business, compliance, and security landscapes, organizations are under pressure to implement clear governance strategies. Yet, many lack a roadmap for ethical, secure, and compliant AI deployment. In this special edition of the #AuditTuesday GRC podcast series, we welcome James Sayles, author of Principles of the Governance Model for Risk Management, to explore the critical issues surrounding AI governance. Sayles will share his expert perspective on where...
Governance Risk and Compliance is a $45.6B market - a market the Managed Service Providers (MPSs) need to be in they want to grow. But GRC, the concept of helping enterprises obtain not only compliance but be able to show proper governance is out of the comfort zone of many MSPs. How to start? How do MSPs get into this much needed space that benefits both the MSP and their clients. That’s what we cover in this webinar. Key Points: How to get starte...
Shared Signals - for those in the identity know - it’s a subject that time has come. Shared Signals refers to a standardized system where organizations can exchange real-time security information about users across different platforms. What we cover, here: Why do we need shared signals?How can we use shared signals?Where will WE get these signals?And what will consume them?To delve into this key security topic we have invited the security and identity experts. We will be joined by Cra...
Privileged users are the source of most enterprise problems: from outsider attacks, insider threads and compliance - the focus usually involves admin accounts. These accounts have to be reviewed - and on a regular basis. How? This webinar addresses:Why privileged accounts need to be reviewed?When do these accounts become stale and dangerous?How to build best practices around these accounts?And... How do we even get started? To delve into this key security topic we had invited...
Huge regulatory changes face the EU nations and the companies that work w/ the EU: Digital Operational Resilience ACT (DORA). The Digital Operational Resilience Act (Regulation (EU) 2022/2554) solves an important problem in the EU financial regulation. DORA mandates that enterprises augment their protection, detection, containment, recovery and repair capabilities against ICT-related incidents. But what does this mean for your enterprise - and what does this mean for your ident...
AWS is the premier cloud vendor - AWS is the basis of most enterprises cloud strategy. To help us understand the importance of AWS and AWS entitlements, YouAttest has partnered with CloudArmee, prominent AWS experts. CloudArmee and YouAttest have partnered together to help enterprises determine what their access entitlements are for their AWS deployments. E.G. for your AWS deployment: What roles have been created? Who has access? What is the identity security posture of ...
The U.S. Department of Defense (DoD) on October 15th, 2024 published its long-anticipating first part of the final rule (32 CFR) for the Cybersecurity Maturity Model Certification (CMMC) program. The program will require third-party verification for contractors working with controlled unclassified information (CUI) confirming that contractors are meeting existing DoD cybersecurity standards and a self-assessment by contractors that have Federal Contract Information (FCI) showing that t...
New administration - new attitude, regulations, priorities on cyber governance? No question. But what will it be? What about CISA?What about NIST?What about the SEC?What about CMMC?All of these and more will be discussed. To answer these questions - YouAttest invites authorities in compliance and security matters, Stacey Cameron, CEO of Cycam Strategies, Karina Klever of Klever Compliance, and Mike Andrewes of Yastis To learn more about YouAttest and how we can help secure your i...
Okta announced that they had a flaw in their authentication - where under “specific circumstances” a user could gain access w/o inputting the password associated with the account. How is this possible? What does this mean?And most importantly…How to secureThat’s what will be discussed this very important #AuditTuesday w/ Greg Kutzbach, Cyber Security and Digital Forensic Expert of Exhib A Cyber. To learn more about YouAttest and how we can help secure your identities, contact us at info...
You can’t talk about cyber security with a professional today without the conversation turning to the topic of the next generation. Namely our youth - with questions coming up, Are they ready for jobs in cyber security? Are they capable of taking the reins of responsibility for cyber security?At what level?And what needs to be done to get them more ready. But how AI is created is not longer a science project - it’s a regulated business. Key aspects of the creation of the AI compon...
loading
Comments